diff --git a/README.md b/README.md
index fec6c141..b967bbc2 100644
--- a/README.md
+++ b/README.md
@@ -1,7 +1,7 @@
-# CDKTF prebuilt bindings for hashicorp/vault provider version 4.4.0
+# CDKTF prebuilt bindings for hashicorp/vault provider version 4.5.0
-This repo builds and publishes the [Terraform vault provider](https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs) bindings for [CDK for Terraform](https://cdk.tf).
+This repo builds and publishes the [Terraform vault provider](https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs) bindings for [CDK for Terraform](https://cdk.tf).
## Available Packages
@@ -63,7 +63,7 @@ This project is explicitly not tracking the Terraform vault provider version 1:1
These are the upstream dependencies:
- [CDK for Terraform](https://cdk.tf)
-- [Terraform vault provider](https://registry.terraform.io/providers/hashicorp/vault/4.4.0)
+- [Terraform vault provider](https://registry.terraform.io/providers/hashicorp/vault/4.5.0)
- [Terraform Engine](https://terraform.io)
If there are breaking changes (backward incompatible) in any of the above, the major version of this project will be bumped.
diff --git a/docs/adSecretBackend.csharp.md b/docs/adSecretBackend.csharp.md
index 5bd6828a..ce54d331 100644
--- a/docs/adSecretBackend.csharp.md
+++ b/docs/adSecretBackend.csharp.md
@@ -4,7 +4,7 @@
### AdSecretBackend
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend vault_ad_secret_backend}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend vault_ad_secret_backend}.
#### Initializers
@@ -698,7 +698,7 @@ The construct id used in the generated config for the AdSecretBackend to import.
The id of the existing AdSecretBackend that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#import import section} in the documentation of this resource for the id to use
---
@@ -1743,7 +1743,7 @@ new AdSecretBackendConfig {
| Groupattr
| string
| LDAP attribute to follow on objects returned by in order to enumerate user group membership. |
| Groupdn
| string
| LDAP search base to use for group membership search (eg: ou=Groups,dc=example,dc=org). |
| Groupfilter
| string
| Go template for querying group membership of user. |
-| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#id AdSecretBackend#id}. |
+| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#id AdSecretBackend#id}. |
| InsecureTls
| object
| Skip LDAP server SSL Certificate verification - insecure and not recommended for production use. |
| LastRotationTolerance
| double
| The number of seconds after a Vault rotation where, if Active Directory shows a later rotation, it should be considered out-of-band. |
| Local
| object
| Mark the secrets engine as local-only. |
@@ -1845,7 +1845,7 @@ public string Binddn { get; set; }
Distinguished name of object to bind when performing user and group search.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#binddn AdSecretBackend#binddn}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#binddn AdSecretBackend#binddn}
---
@@ -1859,7 +1859,7 @@ public string Bindpass { get; set; }
LDAP password for searching for the user DN.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#bindpass AdSecretBackend#bindpass}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#bindpass AdSecretBackend#bindpass}
---
@@ -1873,7 +1873,7 @@ public object AnonymousGroupSearch { get; set; }
Use anonymous binds when performing LDAP group searches (if true the initial credentials will still be used for the initial connection test).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#anonymous_group_search AdSecretBackend#anonymous_group_search}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#anonymous_group_search AdSecretBackend#anonymous_group_search}
---
@@ -1887,7 +1887,7 @@ public string Backend { get; set; }
The mount path for a backend, for example, the path given in "$ vault auth enable -path=my-ad ad".
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#backend AdSecretBackend#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#backend AdSecretBackend#backend}
---
@@ -1901,7 +1901,7 @@ public object CaseSensitiveNames { get; set; }
If true, case sensitivity will be used when comparing usernames and groups for matching policies.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#case_sensitive_names AdSecretBackend#case_sensitive_names}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#case_sensitive_names AdSecretBackend#case_sensitive_names}
---
@@ -1915,7 +1915,7 @@ public string Certificate { get; set; }
CA certificate to use when verifying LDAP server certificate, must be x509 PEM encoded.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#certificate AdSecretBackend#certificate}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#certificate AdSecretBackend#certificate}
---
@@ -1929,7 +1929,7 @@ public string ClientTlsCert { get; set; }
Client certificate to provide to the LDAP server, must be x509 PEM encoded.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#client_tls_cert AdSecretBackend#client_tls_cert}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#client_tls_cert AdSecretBackend#client_tls_cert}
---
@@ -1943,7 +1943,7 @@ public string ClientTlsKey { get; set; }
Client certificate key to provide to the LDAP server, must be x509 PEM encoded.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#client_tls_key AdSecretBackend#client_tls_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#client_tls_key AdSecretBackend#client_tls_key}
---
@@ -1957,7 +1957,7 @@ public double DefaultLeaseTtlSeconds { get; set; }
Default lease duration for secrets in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#default_lease_ttl_seconds AdSecretBackend#default_lease_ttl_seconds}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#default_lease_ttl_seconds AdSecretBackend#default_lease_ttl_seconds}
---
@@ -1971,7 +1971,7 @@ public object DenyNullBind { get; set; }
Denies an unauthenticated LDAP bind request if the user's password is empty; defaults to true.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#deny_null_bind AdSecretBackend#deny_null_bind}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#deny_null_bind AdSecretBackend#deny_null_bind}
---
@@ -1985,7 +1985,7 @@ public string Description { get; set; }
Human-friendly description of the mount for the backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#description AdSecretBackend#description}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#description AdSecretBackend#description}
---
@@ -1999,7 +1999,7 @@ public object DisableRemount { get; set; }
If set, opts out of mount migration on path updates.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#disable_remount AdSecretBackend#disable_remount}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#disable_remount AdSecretBackend#disable_remount}
---
@@ -2013,7 +2013,7 @@ public object Discoverdn { get; set; }
Use anonymous bind to discover the bind DN of a user.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#discoverdn AdSecretBackend#discoverdn}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#discoverdn AdSecretBackend#discoverdn}
---
@@ -2029,7 +2029,7 @@ LDAP attribute to follow on objects returned by in order to enumer
Examples: "cn" or "memberOf", etc. Default: cn
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#groupattr AdSecretBackend#groupattr}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#groupattr AdSecretBackend#groupattr}
---
@@ -2043,7 +2043,7 @@ public string Groupdn { get; set; }
LDAP search base to use for group membership search (eg: ou=Groups,dc=example,dc=org).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#groupdn AdSecretBackend#groupdn}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#groupdn AdSecretBackend#groupdn}
---
@@ -2059,7 +2059,7 @@ Go template for querying group membership of user.
The template can access the following context variables: UserDN, Username Example: (&(objectClass=group)(member:1.2.840.113556.1.4.1941:={{.UserDN}})) Default: (|(memberUid={{.Username}})(member={{.UserDN}})(uniqueMember={{.UserDN}}))
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#groupfilter AdSecretBackend#groupfilter}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#groupfilter AdSecretBackend#groupfilter}
---
@@ -2071,7 +2071,7 @@ public string Id { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#id AdSecretBackend#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#id AdSecretBackend#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -2088,7 +2088,7 @@ public object InsecureTls { get; set; }
Skip LDAP server SSL Certificate verification - insecure and not recommended for production use.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#insecure_tls AdSecretBackend#insecure_tls}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#insecure_tls AdSecretBackend#insecure_tls}
---
@@ -2102,7 +2102,7 @@ public double LastRotationTolerance { get; set; }
The number of seconds after a Vault rotation where, if Active Directory shows a later rotation, it should be considered out-of-band.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#last_rotation_tolerance AdSecretBackend#last_rotation_tolerance}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#last_rotation_tolerance AdSecretBackend#last_rotation_tolerance}
---
@@ -2118,7 +2118,7 @@ Mark the secrets engine as local-only.
Local engines are not replicated or removed by replication.Tolerance duration to use when checking the last rotation time.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#local AdSecretBackend#local}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#local AdSecretBackend#local}
---
@@ -2132,7 +2132,7 @@ public double MaxLeaseTtlSeconds { get; set; }
Maximum possible lease duration for secrets in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#max_lease_ttl_seconds AdSecretBackend#max_lease_ttl_seconds}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#max_lease_ttl_seconds AdSecretBackend#max_lease_ttl_seconds}
---
@@ -2146,7 +2146,7 @@ public double MaxTtl { get; set; }
In seconds, the maximum password time-to-live.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#max_ttl AdSecretBackend#max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#max_ttl AdSecretBackend#max_ttl}
---
@@ -2160,7 +2160,7 @@ public string Namespace { get; set; }
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#namespace AdSecretBackend#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#namespace AdSecretBackend#namespace}
---
@@ -2174,7 +2174,7 @@ public string PasswordPolicy { get; set; }
Name of the password policy to use to generate passwords.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#password_policy AdSecretBackend#password_policy}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#password_policy AdSecretBackend#password_policy}
---
@@ -2188,7 +2188,7 @@ public double RequestTimeout { get; set; }
Timeout, in seconds, for the connection when making requests against the server before returning back an error.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#request_timeout AdSecretBackend#request_timeout}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#request_timeout AdSecretBackend#request_timeout}
---
@@ -2202,7 +2202,7 @@ public object Starttls { get; set; }
Issue a StartTLS command after establishing unencrypted connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#starttls AdSecretBackend#starttls}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#starttls AdSecretBackend#starttls}
---
@@ -2216,7 +2216,7 @@ public string TlsMaxVersion { get; set; }
Maximum TLS version to use. Accepted values are 'tls10', 'tls11', 'tls12' or 'tls13'. Defaults to 'tls12'.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#tls_max_version AdSecretBackend#tls_max_version}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#tls_max_version AdSecretBackend#tls_max_version}
---
@@ -2230,7 +2230,7 @@ public string TlsMinVersion { get; set; }
Minimum TLS version to use. Accepted values are 'tls10', 'tls11', 'tls12' or 'tls13'. Defaults to 'tls12'.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#tls_min_version AdSecretBackend#tls_min_version}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#tls_min_version AdSecretBackend#tls_min_version}
---
@@ -2244,7 +2244,7 @@ public double Ttl { get; set; }
In seconds, the default password time-to-live.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#ttl AdSecretBackend#ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#ttl AdSecretBackend#ttl}
---
@@ -2258,7 +2258,7 @@ public string Upndomain { get; set; }
Enables userPrincipalDomain login with [username]@UPNDomain.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#upndomain AdSecretBackend#upndomain}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#upndomain AdSecretBackend#upndomain}
---
@@ -2272,7 +2272,7 @@ public string Url { get; set; }
LDAP URL to connect to (default: ldap://127.0.0.1). Multiple URLs can be specified by concatenating them with commas; they will be tried in-order.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#url AdSecretBackend#url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#url AdSecretBackend#url}
---
@@ -2286,7 +2286,7 @@ public object UsePre111GroupCnBehavior { get; set; }
In Vault 1.1.1 a fix for handling group CN values of different cases unfortunately introduced a regression that could cause previously defined groups to not be found due to a change in the resulting name. If set true, the pre-1.1.1 behavior for matching group CNs will be used. This is only needed in some upgrade scenarios for backwards compatibility. It is enabled by default if the config is upgraded but disabled by default on new configurations.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#use_pre111_group_cn_behavior AdSecretBackend#use_pre111_group_cn_behavior}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#use_pre111_group_cn_behavior AdSecretBackend#use_pre111_group_cn_behavior}
---
@@ -2300,7 +2300,7 @@ public string Userattr { get; set; }
Attribute used for users (default: cn).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#userattr AdSecretBackend#userattr}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#userattr AdSecretBackend#userattr}
---
@@ -2314,7 +2314,7 @@ public string Userdn { get; set; }
LDAP domain to use for users (eg: ou=People,dc=example,dc=org).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#userdn AdSecretBackend#userdn}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#userdn AdSecretBackend#userdn}
---
@@ -2330,7 +2330,7 @@ If true, use the Active Directory tokenGroups constructed attribute of the user
This will find all security groups including nested ones.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#use_token_groups AdSecretBackend#use_token_groups}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#use_token_groups AdSecretBackend#use_token_groups}
---
diff --git a/docs/adSecretBackend.go.md b/docs/adSecretBackend.go.md
index 3f882bbc..6cec8d09 100644
--- a/docs/adSecretBackend.go.md
+++ b/docs/adSecretBackend.go.md
@@ -4,7 +4,7 @@
### AdSecretBackend
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend vault_ad_secret_backend}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend vault_ad_secret_backend}.
#### Initializers
@@ -698,7 +698,7 @@ The construct id used in the generated config for the AdSecretBackend to import.
The id of the existing AdSecretBackend that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#import import section} in the documentation of this resource for the id to use
---
@@ -1743,7 +1743,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/adsecretbackend"
| Groupattr
| *string
| LDAP attribute to follow on objects returned by in order to enumerate user group membership. |
| Groupdn
| *string
| LDAP search base to use for group membership search (eg: ou=Groups,dc=example,dc=org). |
| Groupfilter
| *string
| Go template for querying group membership of user. |
-| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#id AdSecretBackend#id}. |
+| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#id AdSecretBackend#id}. |
| InsecureTls
| interface{}
| Skip LDAP server SSL Certificate verification - insecure and not recommended for production use. |
| LastRotationTolerance
| *f64
| The number of seconds after a Vault rotation where, if Active Directory shows a later rotation, it should be considered out-of-band. |
| Local
| interface{}
| Mark the secrets engine as local-only. |
@@ -1845,7 +1845,7 @@ Binddn *string
Distinguished name of object to bind when performing user and group search.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#binddn AdSecretBackend#binddn}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#binddn AdSecretBackend#binddn}
---
@@ -1859,7 +1859,7 @@ Bindpass *string
LDAP password for searching for the user DN.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#bindpass AdSecretBackend#bindpass}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#bindpass AdSecretBackend#bindpass}
---
@@ -1873,7 +1873,7 @@ AnonymousGroupSearch interface{}
Use anonymous binds when performing LDAP group searches (if true the initial credentials will still be used for the initial connection test).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#anonymous_group_search AdSecretBackend#anonymous_group_search}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#anonymous_group_search AdSecretBackend#anonymous_group_search}
---
@@ -1887,7 +1887,7 @@ Backend *string
The mount path for a backend, for example, the path given in "$ vault auth enable -path=my-ad ad".
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#backend AdSecretBackend#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#backend AdSecretBackend#backend}
---
@@ -1901,7 +1901,7 @@ CaseSensitiveNames interface{}
If true, case sensitivity will be used when comparing usernames and groups for matching policies.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#case_sensitive_names AdSecretBackend#case_sensitive_names}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#case_sensitive_names AdSecretBackend#case_sensitive_names}
---
@@ -1915,7 +1915,7 @@ Certificate *string
CA certificate to use when verifying LDAP server certificate, must be x509 PEM encoded.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#certificate AdSecretBackend#certificate}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#certificate AdSecretBackend#certificate}
---
@@ -1929,7 +1929,7 @@ ClientTlsCert *string
Client certificate to provide to the LDAP server, must be x509 PEM encoded.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#client_tls_cert AdSecretBackend#client_tls_cert}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#client_tls_cert AdSecretBackend#client_tls_cert}
---
@@ -1943,7 +1943,7 @@ ClientTlsKey *string
Client certificate key to provide to the LDAP server, must be x509 PEM encoded.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#client_tls_key AdSecretBackend#client_tls_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#client_tls_key AdSecretBackend#client_tls_key}
---
@@ -1957,7 +1957,7 @@ DefaultLeaseTtlSeconds *f64
Default lease duration for secrets in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#default_lease_ttl_seconds AdSecretBackend#default_lease_ttl_seconds}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#default_lease_ttl_seconds AdSecretBackend#default_lease_ttl_seconds}
---
@@ -1971,7 +1971,7 @@ DenyNullBind interface{}
Denies an unauthenticated LDAP bind request if the user's password is empty; defaults to true.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#deny_null_bind AdSecretBackend#deny_null_bind}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#deny_null_bind AdSecretBackend#deny_null_bind}
---
@@ -1985,7 +1985,7 @@ Description *string
Human-friendly description of the mount for the backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#description AdSecretBackend#description}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#description AdSecretBackend#description}
---
@@ -1999,7 +1999,7 @@ DisableRemount interface{}
If set, opts out of mount migration on path updates.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#disable_remount AdSecretBackend#disable_remount}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#disable_remount AdSecretBackend#disable_remount}
---
@@ -2013,7 +2013,7 @@ Discoverdn interface{}
Use anonymous bind to discover the bind DN of a user.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#discoverdn AdSecretBackend#discoverdn}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#discoverdn AdSecretBackend#discoverdn}
---
@@ -2029,7 +2029,7 @@ LDAP attribute to follow on objects returned by in order to enumer
Examples: "cn" or "memberOf", etc. Default: cn
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#groupattr AdSecretBackend#groupattr}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#groupattr AdSecretBackend#groupattr}
---
@@ -2043,7 +2043,7 @@ Groupdn *string
LDAP search base to use for group membership search (eg: ou=Groups,dc=example,dc=org).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#groupdn AdSecretBackend#groupdn}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#groupdn AdSecretBackend#groupdn}
---
@@ -2059,7 +2059,7 @@ Go template for querying group membership of user.
The template can access the following context variables: UserDN, Username Example: (&(objectClass=group)(member:1.2.840.113556.1.4.1941:={{.UserDN}})) Default: (|(memberUid={{.Username}})(member={{.UserDN}})(uniqueMember={{.UserDN}}))
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#groupfilter AdSecretBackend#groupfilter}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#groupfilter AdSecretBackend#groupfilter}
---
@@ -2071,7 +2071,7 @@ Id *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#id AdSecretBackend#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#id AdSecretBackend#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -2088,7 +2088,7 @@ InsecureTls interface{}
Skip LDAP server SSL Certificate verification - insecure and not recommended for production use.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#insecure_tls AdSecretBackend#insecure_tls}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#insecure_tls AdSecretBackend#insecure_tls}
---
@@ -2102,7 +2102,7 @@ LastRotationTolerance *f64
The number of seconds after a Vault rotation where, if Active Directory shows a later rotation, it should be considered out-of-band.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#last_rotation_tolerance AdSecretBackend#last_rotation_tolerance}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#last_rotation_tolerance AdSecretBackend#last_rotation_tolerance}
---
@@ -2118,7 +2118,7 @@ Mark the secrets engine as local-only.
Local engines are not replicated or removed by replication.Tolerance duration to use when checking the last rotation time.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#local AdSecretBackend#local}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#local AdSecretBackend#local}
---
@@ -2132,7 +2132,7 @@ MaxLeaseTtlSeconds *f64
Maximum possible lease duration for secrets in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#max_lease_ttl_seconds AdSecretBackend#max_lease_ttl_seconds}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#max_lease_ttl_seconds AdSecretBackend#max_lease_ttl_seconds}
---
@@ -2146,7 +2146,7 @@ MaxTtl *f64
In seconds, the maximum password time-to-live.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#max_ttl AdSecretBackend#max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#max_ttl AdSecretBackend#max_ttl}
---
@@ -2160,7 +2160,7 @@ Namespace *string
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#namespace AdSecretBackend#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#namespace AdSecretBackend#namespace}
---
@@ -2174,7 +2174,7 @@ PasswordPolicy *string
Name of the password policy to use to generate passwords.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#password_policy AdSecretBackend#password_policy}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#password_policy AdSecretBackend#password_policy}
---
@@ -2188,7 +2188,7 @@ RequestTimeout *f64
Timeout, in seconds, for the connection when making requests against the server before returning back an error.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#request_timeout AdSecretBackend#request_timeout}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#request_timeout AdSecretBackend#request_timeout}
---
@@ -2202,7 +2202,7 @@ Starttls interface{}
Issue a StartTLS command after establishing unencrypted connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#starttls AdSecretBackend#starttls}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#starttls AdSecretBackend#starttls}
---
@@ -2216,7 +2216,7 @@ TlsMaxVersion *string
Maximum TLS version to use. Accepted values are 'tls10', 'tls11', 'tls12' or 'tls13'. Defaults to 'tls12'.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#tls_max_version AdSecretBackend#tls_max_version}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#tls_max_version AdSecretBackend#tls_max_version}
---
@@ -2230,7 +2230,7 @@ TlsMinVersion *string
Minimum TLS version to use. Accepted values are 'tls10', 'tls11', 'tls12' or 'tls13'. Defaults to 'tls12'.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#tls_min_version AdSecretBackend#tls_min_version}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#tls_min_version AdSecretBackend#tls_min_version}
---
@@ -2244,7 +2244,7 @@ Ttl *f64
In seconds, the default password time-to-live.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#ttl AdSecretBackend#ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#ttl AdSecretBackend#ttl}
---
@@ -2258,7 +2258,7 @@ Upndomain *string
Enables userPrincipalDomain login with [username]@UPNDomain.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#upndomain AdSecretBackend#upndomain}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#upndomain AdSecretBackend#upndomain}
---
@@ -2272,7 +2272,7 @@ Url *string
LDAP URL to connect to (default: ldap://127.0.0.1). Multiple URLs can be specified by concatenating them with commas; they will be tried in-order.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#url AdSecretBackend#url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#url AdSecretBackend#url}
---
@@ -2286,7 +2286,7 @@ UsePre111GroupCnBehavior interface{}
In Vault 1.1.1 a fix for handling group CN values of different cases unfortunately introduced a regression that could cause previously defined groups to not be found due to a change in the resulting name. If set true, the pre-1.1.1 behavior for matching group CNs will be used. This is only needed in some upgrade scenarios for backwards compatibility. It is enabled by default if the config is upgraded but disabled by default on new configurations.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#use_pre111_group_cn_behavior AdSecretBackend#use_pre111_group_cn_behavior}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#use_pre111_group_cn_behavior AdSecretBackend#use_pre111_group_cn_behavior}
---
@@ -2300,7 +2300,7 @@ Userattr *string
Attribute used for users (default: cn).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#userattr AdSecretBackend#userattr}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#userattr AdSecretBackend#userattr}
---
@@ -2314,7 +2314,7 @@ Userdn *string
LDAP domain to use for users (eg: ou=People,dc=example,dc=org).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#userdn AdSecretBackend#userdn}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#userdn AdSecretBackend#userdn}
---
@@ -2330,7 +2330,7 @@ If true, use the Active Directory tokenGroups constructed attribute of the user
This will find all security groups including nested ones.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#use_token_groups AdSecretBackend#use_token_groups}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#use_token_groups AdSecretBackend#use_token_groups}
---
diff --git a/docs/adSecretBackend.java.md b/docs/adSecretBackend.java.md
index baee1a17..c4da6530 100644
--- a/docs/adSecretBackend.java.md
+++ b/docs/adSecretBackend.java.md
@@ -4,7 +4,7 @@
### AdSecretBackend
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend vault_ad_secret_backend}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend vault_ad_secret_backend}.
#### Initializers
@@ -98,7 +98,7 @@ AdSecretBackend.Builder.create(Construct scope, java.lang.String id)
| groupattr
| java.lang.String
| LDAP attribute to follow on objects returned by in order to enumerate user group membership. |
| groupdn
| java.lang.String
| LDAP search base to use for group membership search (eg: ou=Groups,dc=example,dc=org). |
| groupfilter
| java.lang.String
| Go template for querying group membership of user. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#id AdSecretBackend#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#id AdSecretBackend#id}. |
| insecureTls
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| Skip LDAP server SSL Certificate verification - insecure and not recommended for production use. |
| lastRotationTolerance
| java.lang.Number
| The number of seconds after a Vault rotation where, if Active Directory shows a later rotation, it should be considered out-of-band. |
| local
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| Mark the secrets engine as local-only. |
@@ -186,7 +186,7 @@ Must be unique amongst siblings in the same scope
Distinguished name of object to bind when performing user and group search.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#binddn AdSecretBackend#binddn}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#binddn AdSecretBackend#binddn}
---
@@ -196,7 +196,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
LDAP password for searching for the user DN.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#bindpass AdSecretBackend#bindpass}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#bindpass AdSecretBackend#bindpass}
---
@@ -206,7 +206,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Use anonymous binds when performing LDAP group searches (if true the initial credentials will still be used for the initial connection test).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#anonymous_group_search AdSecretBackend#anonymous_group_search}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#anonymous_group_search AdSecretBackend#anonymous_group_search}
---
@@ -216,7 +216,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The mount path for a backend, for example, the path given in "$ vault auth enable -path=my-ad ad".
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#backend AdSecretBackend#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#backend AdSecretBackend#backend}
---
@@ -226,7 +226,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
If true, case sensitivity will be used when comparing usernames and groups for matching policies.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#case_sensitive_names AdSecretBackend#case_sensitive_names}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#case_sensitive_names AdSecretBackend#case_sensitive_names}
---
@@ -236,7 +236,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
CA certificate to use when verifying LDAP server certificate, must be x509 PEM encoded.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#certificate AdSecretBackend#certificate}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#certificate AdSecretBackend#certificate}
---
@@ -246,7 +246,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Client certificate to provide to the LDAP server, must be x509 PEM encoded.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#client_tls_cert AdSecretBackend#client_tls_cert}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#client_tls_cert AdSecretBackend#client_tls_cert}
---
@@ -256,7 +256,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Client certificate key to provide to the LDAP server, must be x509 PEM encoded.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#client_tls_key AdSecretBackend#client_tls_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#client_tls_key AdSecretBackend#client_tls_key}
---
@@ -266,7 +266,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Default lease duration for secrets in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#default_lease_ttl_seconds AdSecretBackend#default_lease_ttl_seconds}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#default_lease_ttl_seconds AdSecretBackend#default_lease_ttl_seconds}
---
@@ -276,7 +276,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Denies an unauthenticated LDAP bind request if the user's password is empty; defaults to true.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#deny_null_bind AdSecretBackend#deny_null_bind}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#deny_null_bind AdSecretBackend#deny_null_bind}
---
@@ -286,7 +286,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Human-friendly description of the mount for the backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#description AdSecretBackend#description}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#description AdSecretBackend#description}
---
@@ -296,7 +296,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
If set, opts out of mount migration on path updates.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#disable_remount AdSecretBackend#disable_remount}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#disable_remount AdSecretBackend#disable_remount}
---
@@ -306,7 +306,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Use anonymous bind to discover the bind DN of a user.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#discoverdn AdSecretBackend#discoverdn}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#discoverdn AdSecretBackend#discoverdn}
---
@@ -318,7 +318,7 @@ LDAP attribute to follow on objects returned by in order to enumer
Examples: "cn" or "memberOf", etc. Default: cn
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#groupattr AdSecretBackend#groupattr}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#groupattr AdSecretBackend#groupattr}
---
@@ -328,7 +328,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
LDAP search base to use for group membership search (eg: ou=Groups,dc=example,dc=org).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#groupdn AdSecretBackend#groupdn}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#groupdn AdSecretBackend#groupdn}
---
@@ -340,7 +340,7 @@ Go template for querying group membership of user.
The template can access the following context variables: UserDN, Username Example: (&(objectClass=group)(member:1.2.840.113556.1.4.1941:={{.UserDN}})) Default: (|(memberUid={{.Username}})(member={{.UserDN}})(uniqueMember={{.UserDN}}))
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#groupfilter AdSecretBackend#groupfilter}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#groupfilter AdSecretBackend#groupfilter}
---
@@ -348,7 +348,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#id AdSecretBackend#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#id AdSecretBackend#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -361,7 +361,7 @@ If you experience problems setting this value it might not be settable. Please t
Skip LDAP server SSL Certificate verification - insecure and not recommended for production use.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#insecure_tls AdSecretBackend#insecure_tls}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#insecure_tls AdSecretBackend#insecure_tls}
---
@@ -371,7 +371,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The number of seconds after a Vault rotation where, if Active Directory shows a later rotation, it should be considered out-of-band.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#last_rotation_tolerance AdSecretBackend#last_rotation_tolerance}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#last_rotation_tolerance AdSecretBackend#last_rotation_tolerance}
---
@@ -383,7 +383,7 @@ Mark the secrets engine as local-only.
Local engines are not replicated or removed by replication.Tolerance duration to use when checking the last rotation time.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#local AdSecretBackend#local}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#local AdSecretBackend#local}
---
@@ -393,7 +393,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Maximum possible lease duration for secrets in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#max_lease_ttl_seconds AdSecretBackend#max_lease_ttl_seconds}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#max_lease_ttl_seconds AdSecretBackend#max_lease_ttl_seconds}
---
@@ -403,7 +403,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
In seconds, the maximum password time-to-live.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#max_ttl AdSecretBackend#max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#max_ttl AdSecretBackend#max_ttl}
---
@@ -413,7 +413,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#namespace AdSecretBackend#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#namespace AdSecretBackend#namespace}
---
@@ -423,7 +423,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Name of the password policy to use to generate passwords.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#password_policy AdSecretBackend#password_policy}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#password_policy AdSecretBackend#password_policy}
---
@@ -433,7 +433,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Timeout, in seconds, for the connection when making requests against the server before returning back an error.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#request_timeout AdSecretBackend#request_timeout}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#request_timeout AdSecretBackend#request_timeout}
---
@@ -443,7 +443,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Issue a StartTLS command after establishing unencrypted connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#starttls AdSecretBackend#starttls}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#starttls AdSecretBackend#starttls}
---
@@ -453,7 +453,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Maximum TLS version to use. Accepted values are 'tls10', 'tls11', 'tls12' or 'tls13'. Defaults to 'tls12'.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#tls_max_version AdSecretBackend#tls_max_version}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#tls_max_version AdSecretBackend#tls_max_version}
---
@@ -463,7 +463,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Minimum TLS version to use. Accepted values are 'tls10', 'tls11', 'tls12' or 'tls13'. Defaults to 'tls12'.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#tls_min_version AdSecretBackend#tls_min_version}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#tls_min_version AdSecretBackend#tls_min_version}
---
@@ -473,7 +473,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
In seconds, the default password time-to-live.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#ttl AdSecretBackend#ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#ttl AdSecretBackend#ttl}
---
@@ -483,7 +483,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Enables userPrincipalDomain login with [username]@UPNDomain.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#upndomain AdSecretBackend#upndomain}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#upndomain AdSecretBackend#upndomain}
---
@@ -493,7 +493,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
LDAP URL to connect to (default: ldap://127.0.0.1). Multiple URLs can be specified by concatenating them with commas; they will be tried in-order.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#url AdSecretBackend#url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#url AdSecretBackend#url}
---
@@ -503,7 +503,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
In Vault 1.1.1 a fix for handling group CN values of different cases unfortunately introduced a regression that could cause previously defined groups to not be found due to a change in the resulting name. If set true, the pre-1.1.1 behavior for matching group CNs will be used. This is only needed in some upgrade scenarios for backwards compatibility. It is enabled by default if the config is upgraded but disabled by default on new configurations.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#use_pre111_group_cn_behavior AdSecretBackend#use_pre111_group_cn_behavior}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#use_pre111_group_cn_behavior AdSecretBackend#use_pre111_group_cn_behavior}
---
@@ -513,7 +513,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Attribute used for users (default: cn).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#userattr AdSecretBackend#userattr}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#userattr AdSecretBackend#userattr}
---
@@ -523,7 +523,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
LDAP domain to use for users (eg: ou=People,dc=example,dc=org).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#userdn AdSecretBackend#userdn}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#userdn AdSecretBackend#userdn}
---
@@ -535,7 +535,7 @@ If true, use the Active Directory tokenGroups constructed attribute of the user
This will find all security groups including nested ones.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#use_token_groups AdSecretBackend#use_token_groups}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#use_token_groups AdSecretBackend#use_token_groups}
---
@@ -1193,7 +1193,7 @@ The construct id used in the generated config for the AdSecretBackend to import.
The id of the existing AdSecretBackend that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#import import section} in the documentation of this resource for the id to use
---
@@ -2252,7 +2252,7 @@ AdSecretBackendConfig.builder()
| groupattr
| java.lang.String
| LDAP attribute to follow on objects returned by in order to enumerate user group membership. |
| groupdn
| java.lang.String
| LDAP search base to use for group membership search (eg: ou=Groups,dc=example,dc=org). |
| groupfilter
| java.lang.String
| Go template for querying group membership of user. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#id AdSecretBackend#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#id AdSecretBackend#id}. |
| insecureTls
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| Skip LDAP server SSL Certificate verification - insecure and not recommended for production use. |
| lastRotationTolerance
| java.lang.Number
| The number of seconds after a Vault rotation where, if Active Directory shows a later rotation, it should be considered out-of-band. |
| local
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| Mark the secrets engine as local-only. |
@@ -2354,7 +2354,7 @@ public java.lang.String getBinddn();
Distinguished name of object to bind when performing user and group search.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#binddn AdSecretBackend#binddn}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#binddn AdSecretBackend#binddn}
---
@@ -2368,7 +2368,7 @@ public java.lang.String getBindpass();
LDAP password for searching for the user DN.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#bindpass AdSecretBackend#bindpass}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#bindpass AdSecretBackend#bindpass}
---
@@ -2382,7 +2382,7 @@ public java.lang.Object getAnonymousGroupSearch();
Use anonymous binds when performing LDAP group searches (if true the initial credentials will still be used for the initial connection test).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#anonymous_group_search AdSecretBackend#anonymous_group_search}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#anonymous_group_search AdSecretBackend#anonymous_group_search}
---
@@ -2396,7 +2396,7 @@ public java.lang.String getBackend();
The mount path for a backend, for example, the path given in "$ vault auth enable -path=my-ad ad".
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#backend AdSecretBackend#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#backend AdSecretBackend#backend}
---
@@ -2410,7 +2410,7 @@ public java.lang.Object getCaseSensitiveNames();
If true, case sensitivity will be used when comparing usernames and groups for matching policies.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#case_sensitive_names AdSecretBackend#case_sensitive_names}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#case_sensitive_names AdSecretBackend#case_sensitive_names}
---
@@ -2424,7 +2424,7 @@ public java.lang.String getCertificate();
CA certificate to use when verifying LDAP server certificate, must be x509 PEM encoded.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#certificate AdSecretBackend#certificate}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#certificate AdSecretBackend#certificate}
---
@@ -2438,7 +2438,7 @@ public java.lang.String getClientTlsCert();
Client certificate to provide to the LDAP server, must be x509 PEM encoded.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#client_tls_cert AdSecretBackend#client_tls_cert}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#client_tls_cert AdSecretBackend#client_tls_cert}
---
@@ -2452,7 +2452,7 @@ public java.lang.String getClientTlsKey();
Client certificate key to provide to the LDAP server, must be x509 PEM encoded.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#client_tls_key AdSecretBackend#client_tls_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#client_tls_key AdSecretBackend#client_tls_key}
---
@@ -2466,7 +2466,7 @@ public java.lang.Number getDefaultLeaseTtlSeconds();
Default lease duration for secrets in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#default_lease_ttl_seconds AdSecretBackend#default_lease_ttl_seconds}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#default_lease_ttl_seconds AdSecretBackend#default_lease_ttl_seconds}
---
@@ -2480,7 +2480,7 @@ public java.lang.Object getDenyNullBind();
Denies an unauthenticated LDAP bind request if the user's password is empty; defaults to true.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#deny_null_bind AdSecretBackend#deny_null_bind}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#deny_null_bind AdSecretBackend#deny_null_bind}
---
@@ -2494,7 +2494,7 @@ public java.lang.String getDescription();
Human-friendly description of the mount for the backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#description AdSecretBackend#description}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#description AdSecretBackend#description}
---
@@ -2508,7 +2508,7 @@ public java.lang.Object getDisableRemount();
If set, opts out of mount migration on path updates.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#disable_remount AdSecretBackend#disable_remount}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#disable_remount AdSecretBackend#disable_remount}
---
@@ -2522,7 +2522,7 @@ public java.lang.Object getDiscoverdn();
Use anonymous bind to discover the bind DN of a user.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#discoverdn AdSecretBackend#discoverdn}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#discoverdn AdSecretBackend#discoverdn}
---
@@ -2538,7 +2538,7 @@ LDAP attribute to follow on objects returned by in order to enumer
Examples: "cn" or "memberOf", etc. Default: cn
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#groupattr AdSecretBackend#groupattr}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#groupattr AdSecretBackend#groupattr}
---
@@ -2552,7 +2552,7 @@ public java.lang.String getGroupdn();
LDAP search base to use for group membership search (eg: ou=Groups,dc=example,dc=org).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#groupdn AdSecretBackend#groupdn}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#groupdn AdSecretBackend#groupdn}
---
@@ -2568,7 +2568,7 @@ Go template for querying group membership of user.
The template can access the following context variables: UserDN, Username Example: (&(objectClass=group)(member:1.2.840.113556.1.4.1941:={{.UserDN}})) Default: (|(memberUid={{.Username}})(member={{.UserDN}})(uniqueMember={{.UserDN}}))
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#groupfilter AdSecretBackend#groupfilter}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#groupfilter AdSecretBackend#groupfilter}
---
@@ -2580,7 +2580,7 @@ public java.lang.String getId();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#id AdSecretBackend#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#id AdSecretBackend#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -2597,7 +2597,7 @@ public java.lang.Object getInsecureTls();
Skip LDAP server SSL Certificate verification - insecure and not recommended for production use.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#insecure_tls AdSecretBackend#insecure_tls}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#insecure_tls AdSecretBackend#insecure_tls}
---
@@ -2611,7 +2611,7 @@ public java.lang.Number getLastRotationTolerance();
The number of seconds after a Vault rotation where, if Active Directory shows a later rotation, it should be considered out-of-band.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#last_rotation_tolerance AdSecretBackend#last_rotation_tolerance}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#last_rotation_tolerance AdSecretBackend#last_rotation_tolerance}
---
@@ -2627,7 +2627,7 @@ Mark the secrets engine as local-only.
Local engines are not replicated or removed by replication.Tolerance duration to use when checking the last rotation time.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#local AdSecretBackend#local}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#local AdSecretBackend#local}
---
@@ -2641,7 +2641,7 @@ public java.lang.Number getMaxLeaseTtlSeconds();
Maximum possible lease duration for secrets in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#max_lease_ttl_seconds AdSecretBackend#max_lease_ttl_seconds}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#max_lease_ttl_seconds AdSecretBackend#max_lease_ttl_seconds}
---
@@ -2655,7 +2655,7 @@ public java.lang.Number getMaxTtl();
In seconds, the maximum password time-to-live.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#max_ttl AdSecretBackend#max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#max_ttl AdSecretBackend#max_ttl}
---
@@ -2669,7 +2669,7 @@ public java.lang.String getNamespace();
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#namespace AdSecretBackend#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#namespace AdSecretBackend#namespace}
---
@@ -2683,7 +2683,7 @@ public java.lang.String getPasswordPolicy();
Name of the password policy to use to generate passwords.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#password_policy AdSecretBackend#password_policy}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#password_policy AdSecretBackend#password_policy}
---
@@ -2697,7 +2697,7 @@ public java.lang.Number getRequestTimeout();
Timeout, in seconds, for the connection when making requests against the server before returning back an error.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#request_timeout AdSecretBackend#request_timeout}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#request_timeout AdSecretBackend#request_timeout}
---
@@ -2711,7 +2711,7 @@ public java.lang.Object getStarttls();
Issue a StartTLS command after establishing unencrypted connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#starttls AdSecretBackend#starttls}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#starttls AdSecretBackend#starttls}
---
@@ -2725,7 +2725,7 @@ public java.lang.String getTlsMaxVersion();
Maximum TLS version to use. Accepted values are 'tls10', 'tls11', 'tls12' or 'tls13'. Defaults to 'tls12'.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#tls_max_version AdSecretBackend#tls_max_version}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#tls_max_version AdSecretBackend#tls_max_version}
---
@@ -2739,7 +2739,7 @@ public java.lang.String getTlsMinVersion();
Minimum TLS version to use. Accepted values are 'tls10', 'tls11', 'tls12' or 'tls13'. Defaults to 'tls12'.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#tls_min_version AdSecretBackend#tls_min_version}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#tls_min_version AdSecretBackend#tls_min_version}
---
@@ -2753,7 +2753,7 @@ public java.lang.Number getTtl();
In seconds, the default password time-to-live.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#ttl AdSecretBackend#ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#ttl AdSecretBackend#ttl}
---
@@ -2767,7 +2767,7 @@ public java.lang.String getUpndomain();
Enables userPrincipalDomain login with [username]@UPNDomain.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#upndomain AdSecretBackend#upndomain}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#upndomain AdSecretBackend#upndomain}
---
@@ -2781,7 +2781,7 @@ public java.lang.String getUrl();
LDAP URL to connect to (default: ldap://127.0.0.1). Multiple URLs can be specified by concatenating them with commas; they will be tried in-order.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#url AdSecretBackend#url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#url AdSecretBackend#url}
---
@@ -2795,7 +2795,7 @@ public java.lang.Object getUsePre111GroupCnBehavior();
In Vault 1.1.1 a fix for handling group CN values of different cases unfortunately introduced a regression that could cause previously defined groups to not be found due to a change in the resulting name. If set true, the pre-1.1.1 behavior for matching group CNs will be used. This is only needed in some upgrade scenarios for backwards compatibility. It is enabled by default if the config is upgraded but disabled by default on new configurations.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#use_pre111_group_cn_behavior AdSecretBackend#use_pre111_group_cn_behavior}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#use_pre111_group_cn_behavior AdSecretBackend#use_pre111_group_cn_behavior}
---
@@ -2809,7 +2809,7 @@ public java.lang.String getUserattr();
Attribute used for users (default: cn).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#userattr AdSecretBackend#userattr}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#userattr AdSecretBackend#userattr}
---
@@ -2823,7 +2823,7 @@ public java.lang.String getUserdn();
LDAP domain to use for users (eg: ou=People,dc=example,dc=org).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#userdn AdSecretBackend#userdn}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#userdn AdSecretBackend#userdn}
---
@@ -2839,7 +2839,7 @@ If true, use the Active Directory tokenGroups constructed attribute of the user
This will find all security groups including nested ones.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#use_token_groups AdSecretBackend#use_token_groups}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#use_token_groups AdSecretBackend#use_token_groups}
---
diff --git a/docs/adSecretBackend.python.md b/docs/adSecretBackend.python.md
index 88229c6c..c253bdf4 100644
--- a/docs/adSecretBackend.python.md
+++ b/docs/adSecretBackend.python.md
@@ -4,7 +4,7 @@
### AdSecretBackend
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend vault_ad_secret_backend}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend vault_ad_secret_backend}.
#### Initializers
@@ -86,7 +86,7 @@ adSecretBackend.AdSecretBackend(
| groupattr
| str
| LDAP attribute to follow on objects returned by in order to enumerate user group membership. |
| groupdn
| str
| LDAP search base to use for group membership search (eg: ou=Groups,dc=example,dc=org). |
| groupfilter
| str
| Go template for querying group membership of user. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#id AdSecretBackend#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#id AdSecretBackend#id}. |
| insecure_tls
| typing.Union[bool, cdktf.IResolvable]
| Skip LDAP server SSL Certificate verification - insecure and not recommended for production use. |
| last_rotation_tolerance
| typing.Union[int, float]
| The number of seconds after a Vault rotation where, if Active Directory shows a later rotation, it should be considered out-of-band. |
| local
| typing.Union[bool, cdktf.IResolvable]
| Mark the secrets engine as local-only. |
@@ -174,7 +174,7 @@ Must be unique amongst siblings in the same scope
Distinguished name of object to bind when performing user and group search.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#binddn AdSecretBackend#binddn}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#binddn AdSecretBackend#binddn}
---
@@ -184,7 +184,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
LDAP password for searching for the user DN.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#bindpass AdSecretBackend#bindpass}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#bindpass AdSecretBackend#bindpass}
---
@@ -194,7 +194,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Use anonymous binds when performing LDAP group searches (if true the initial credentials will still be used for the initial connection test).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#anonymous_group_search AdSecretBackend#anonymous_group_search}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#anonymous_group_search AdSecretBackend#anonymous_group_search}
---
@@ -204,7 +204,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The mount path for a backend, for example, the path given in "$ vault auth enable -path=my-ad ad".
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#backend AdSecretBackend#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#backend AdSecretBackend#backend}
---
@@ -214,7 +214,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
If true, case sensitivity will be used when comparing usernames and groups for matching policies.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#case_sensitive_names AdSecretBackend#case_sensitive_names}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#case_sensitive_names AdSecretBackend#case_sensitive_names}
---
@@ -224,7 +224,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
CA certificate to use when verifying LDAP server certificate, must be x509 PEM encoded.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#certificate AdSecretBackend#certificate}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#certificate AdSecretBackend#certificate}
---
@@ -234,7 +234,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Client certificate to provide to the LDAP server, must be x509 PEM encoded.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#client_tls_cert AdSecretBackend#client_tls_cert}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#client_tls_cert AdSecretBackend#client_tls_cert}
---
@@ -244,7 +244,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Client certificate key to provide to the LDAP server, must be x509 PEM encoded.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#client_tls_key AdSecretBackend#client_tls_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#client_tls_key AdSecretBackend#client_tls_key}
---
@@ -254,7 +254,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Default lease duration for secrets in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#default_lease_ttl_seconds AdSecretBackend#default_lease_ttl_seconds}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#default_lease_ttl_seconds AdSecretBackend#default_lease_ttl_seconds}
---
@@ -264,7 +264,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Denies an unauthenticated LDAP bind request if the user's password is empty; defaults to true.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#deny_null_bind AdSecretBackend#deny_null_bind}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#deny_null_bind AdSecretBackend#deny_null_bind}
---
@@ -274,7 +274,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Human-friendly description of the mount for the backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#description AdSecretBackend#description}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#description AdSecretBackend#description}
---
@@ -284,7 +284,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
If set, opts out of mount migration on path updates.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#disable_remount AdSecretBackend#disable_remount}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#disable_remount AdSecretBackend#disable_remount}
---
@@ -294,7 +294,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Use anonymous bind to discover the bind DN of a user.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#discoverdn AdSecretBackend#discoverdn}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#discoverdn AdSecretBackend#discoverdn}
---
@@ -306,7 +306,7 @@ LDAP attribute to follow on objects returned by in order to enumer
Examples: "cn" or "memberOf", etc. Default: cn
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#groupattr AdSecretBackend#groupattr}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#groupattr AdSecretBackend#groupattr}
---
@@ -316,7 +316,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
LDAP search base to use for group membership search (eg: ou=Groups,dc=example,dc=org).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#groupdn AdSecretBackend#groupdn}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#groupdn AdSecretBackend#groupdn}
---
@@ -328,7 +328,7 @@ Go template for querying group membership of user.
The template can access the following context variables: UserDN, Username Example: (&(objectClass=group)(member:1.2.840.113556.1.4.1941:={{.UserDN}})) Default: (|(memberUid={{.Username}})(member={{.UserDN}})(uniqueMember={{.UserDN}}))
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#groupfilter AdSecretBackend#groupfilter}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#groupfilter AdSecretBackend#groupfilter}
---
@@ -336,7 +336,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#id AdSecretBackend#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#id AdSecretBackend#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -349,7 +349,7 @@ If you experience problems setting this value it might not be settable. Please t
Skip LDAP server SSL Certificate verification - insecure and not recommended for production use.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#insecure_tls AdSecretBackend#insecure_tls}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#insecure_tls AdSecretBackend#insecure_tls}
---
@@ -359,7 +359,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The number of seconds after a Vault rotation where, if Active Directory shows a later rotation, it should be considered out-of-band.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#last_rotation_tolerance AdSecretBackend#last_rotation_tolerance}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#last_rotation_tolerance AdSecretBackend#last_rotation_tolerance}
---
@@ -371,7 +371,7 @@ Mark the secrets engine as local-only.
Local engines are not replicated or removed by replication.Tolerance duration to use when checking the last rotation time.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#local AdSecretBackend#local}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#local AdSecretBackend#local}
---
@@ -381,7 +381,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Maximum possible lease duration for secrets in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#max_lease_ttl_seconds AdSecretBackend#max_lease_ttl_seconds}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#max_lease_ttl_seconds AdSecretBackend#max_lease_ttl_seconds}
---
@@ -391,7 +391,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
In seconds, the maximum password time-to-live.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#max_ttl AdSecretBackend#max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#max_ttl AdSecretBackend#max_ttl}
---
@@ -401,7 +401,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#namespace AdSecretBackend#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#namespace AdSecretBackend#namespace}
---
@@ -411,7 +411,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Name of the password policy to use to generate passwords.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#password_policy AdSecretBackend#password_policy}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#password_policy AdSecretBackend#password_policy}
---
@@ -421,7 +421,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Timeout, in seconds, for the connection when making requests against the server before returning back an error.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#request_timeout AdSecretBackend#request_timeout}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#request_timeout AdSecretBackend#request_timeout}
---
@@ -431,7 +431,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Issue a StartTLS command after establishing unencrypted connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#starttls AdSecretBackend#starttls}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#starttls AdSecretBackend#starttls}
---
@@ -441,7 +441,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Maximum TLS version to use. Accepted values are 'tls10', 'tls11', 'tls12' or 'tls13'. Defaults to 'tls12'.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#tls_max_version AdSecretBackend#tls_max_version}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#tls_max_version AdSecretBackend#tls_max_version}
---
@@ -451,7 +451,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Minimum TLS version to use. Accepted values are 'tls10', 'tls11', 'tls12' or 'tls13'. Defaults to 'tls12'.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#tls_min_version AdSecretBackend#tls_min_version}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#tls_min_version AdSecretBackend#tls_min_version}
---
@@ -461,7 +461,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
In seconds, the default password time-to-live.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#ttl AdSecretBackend#ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#ttl AdSecretBackend#ttl}
---
@@ -471,7 +471,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Enables userPrincipalDomain login with [username]@UPNDomain.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#upndomain AdSecretBackend#upndomain}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#upndomain AdSecretBackend#upndomain}
---
@@ -481,7 +481,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
LDAP URL to connect to (default: ldap://127.0.0.1). Multiple URLs can be specified by concatenating them with commas; they will be tried in-order.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#url AdSecretBackend#url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#url AdSecretBackend#url}
---
@@ -491,7 +491,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
In Vault 1.1.1 a fix for handling group CN values of different cases unfortunately introduced a regression that could cause previously defined groups to not be found due to a change in the resulting name. If set true, the pre-1.1.1 behavior for matching group CNs will be used. This is only needed in some upgrade scenarios for backwards compatibility. It is enabled by default if the config is upgraded but disabled by default on new configurations.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#use_pre111_group_cn_behavior AdSecretBackend#use_pre111_group_cn_behavior}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#use_pre111_group_cn_behavior AdSecretBackend#use_pre111_group_cn_behavior}
---
@@ -501,7 +501,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Attribute used for users (default: cn).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#userattr AdSecretBackend#userattr}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#userattr AdSecretBackend#userattr}
---
@@ -511,7 +511,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
LDAP domain to use for users (eg: ou=People,dc=example,dc=org).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#userdn AdSecretBackend#userdn}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#userdn AdSecretBackend#userdn}
---
@@ -523,7 +523,7 @@ If true, use the Active Directory tokenGroups constructed attribute of the user
This will find all security groups including nested ones.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#use_token_groups AdSecretBackend#use_token_groups}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#use_token_groups AdSecretBackend#use_token_groups}
---
@@ -1227,7 +1227,7 @@ The construct id used in the generated config for the AdSecretBackend to import.
The id of the existing AdSecretBackend that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#import import section} in the documentation of this resource for the id to use
---
@@ -2272,7 +2272,7 @@ adSecretBackend.AdSecretBackendConfig(
| groupattr
| str
| LDAP attribute to follow on objects returned by in order to enumerate user group membership. |
| groupdn
| str
| LDAP search base to use for group membership search (eg: ou=Groups,dc=example,dc=org). |
| groupfilter
| str
| Go template for querying group membership of user. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#id AdSecretBackend#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#id AdSecretBackend#id}. |
| insecure_tls
| typing.Union[bool, cdktf.IResolvable]
| Skip LDAP server SSL Certificate verification - insecure and not recommended for production use. |
| last_rotation_tolerance
| typing.Union[int, float]
| The number of seconds after a Vault rotation where, if Active Directory shows a later rotation, it should be considered out-of-band. |
| local
| typing.Union[bool, cdktf.IResolvable]
| Mark the secrets engine as local-only. |
@@ -2374,7 +2374,7 @@ binddn: str
Distinguished name of object to bind when performing user and group search.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#binddn AdSecretBackend#binddn}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#binddn AdSecretBackend#binddn}
---
@@ -2388,7 +2388,7 @@ bindpass: str
LDAP password for searching for the user DN.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#bindpass AdSecretBackend#bindpass}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#bindpass AdSecretBackend#bindpass}
---
@@ -2402,7 +2402,7 @@ anonymous_group_search: typing.Union[bool, IResolvable]
Use anonymous binds when performing LDAP group searches (if true the initial credentials will still be used for the initial connection test).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#anonymous_group_search AdSecretBackend#anonymous_group_search}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#anonymous_group_search AdSecretBackend#anonymous_group_search}
---
@@ -2416,7 +2416,7 @@ backend: str
The mount path for a backend, for example, the path given in "$ vault auth enable -path=my-ad ad".
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#backend AdSecretBackend#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#backend AdSecretBackend#backend}
---
@@ -2430,7 +2430,7 @@ case_sensitive_names: typing.Union[bool, IResolvable]
If true, case sensitivity will be used when comparing usernames and groups for matching policies.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#case_sensitive_names AdSecretBackend#case_sensitive_names}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#case_sensitive_names AdSecretBackend#case_sensitive_names}
---
@@ -2444,7 +2444,7 @@ certificate: str
CA certificate to use when verifying LDAP server certificate, must be x509 PEM encoded.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#certificate AdSecretBackend#certificate}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#certificate AdSecretBackend#certificate}
---
@@ -2458,7 +2458,7 @@ client_tls_cert: str
Client certificate to provide to the LDAP server, must be x509 PEM encoded.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#client_tls_cert AdSecretBackend#client_tls_cert}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#client_tls_cert AdSecretBackend#client_tls_cert}
---
@@ -2472,7 +2472,7 @@ client_tls_key: str
Client certificate key to provide to the LDAP server, must be x509 PEM encoded.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#client_tls_key AdSecretBackend#client_tls_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#client_tls_key AdSecretBackend#client_tls_key}
---
@@ -2486,7 +2486,7 @@ default_lease_ttl_seconds: typing.Union[int, float]
Default lease duration for secrets in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#default_lease_ttl_seconds AdSecretBackend#default_lease_ttl_seconds}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#default_lease_ttl_seconds AdSecretBackend#default_lease_ttl_seconds}
---
@@ -2500,7 +2500,7 @@ deny_null_bind: typing.Union[bool, IResolvable]
Denies an unauthenticated LDAP bind request if the user's password is empty; defaults to true.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#deny_null_bind AdSecretBackend#deny_null_bind}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#deny_null_bind AdSecretBackend#deny_null_bind}
---
@@ -2514,7 +2514,7 @@ description: str
Human-friendly description of the mount for the backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#description AdSecretBackend#description}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#description AdSecretBackend#description}
---
@@ -2528,7 +2528,7 @@ disable_remount: typing.Union[bool, IResolvable]
If set, opts out of mount migration on path updates.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#disable_remount AdSecretBackend#disable_remount}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#disable_remount AdSecretBackend#disable_remount}
---
@@ -2542,7 +2542,7 @@ discoverdn: typing.Union[bool, IResolvable]
Use anonymous bind to discover the bind DN of a user.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#discoverdn AdSecretBackend#discoverdn}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#discoverdn AdSecretBackend#discoverdn}
---
@@ -2558,7 +2558,7 @@ LDAP attribute to follow on objects returned by in order to enumer
Examples: "cn" or "memberOf", etc. Default: cn
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#groupattr AdSecretBackend#groupattr}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#groupattr AdSecretBackend#groupattr}
---
@@ -2572,7 +2572,7 @@ groupdn: str
LDAP search base to use for group membership search (eg: ou=Groups,dc=example,dc=org).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#groupdn AdSecretBackend#groupdn}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#groupdn AdSecretBackend#groupdn}
---
@@ -2588,7 +2588,7 @@ Go template for querying group membership of user.
The template can access the following context variables: UserDN, Username Example: (&(objectClass=group)(member:1.2.840.113556.1.4.1941:={{.UserDN}})) Default: (|(memberUid={{.Username}})(member={{.UserDN}})(uniqueMember={{.UserDN}}))
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#groupfilter AdSecretBackend#groupfilter}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#groupfilter AdSecretBackend#groupfilter}
---
@@ -2600,7 +2600,7 @@ id: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#id AdSecretBackend#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#id AdSecretBackend#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -2617,7 +2617,7 @@ insecure_tls: typing.Union[bool, IResolvable]
Skip LDAP server SSL Certificate verification - insecure and not recommended for production use.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#insecure_tls AdSecretBackend#insecure_tls}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#insecure_tls AdSecretBackend#insecure_tls}
---
@@ -2631,7 +2631,7 @@ last_rotation_tolerance: typing.Union[int, float]
The number of seconds after a Vault rotation where, if Active Directory shows a later rotation, it should be considered out-of-band.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#last_rotation_tolerance AdSecretBackend#last_rotation_tolerance}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#last_rotation_tolerance AdSecretBackend#last_rotation_tolerance}
---
@@ -2647,7 +2647,7 @@ Mark the secrets engine as local-only.
Local engines are not replicated or removed by replication.Tolerance duration to use when checking the last rotation time.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#local AdSecretBackend#local}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#local AdSecretBackend#local}
---
@@ -2661,7 +2661,7 @@ max_lease_ttl_seconds: typing.Union[int, float]
Maximum possible lease duration for secrets in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#max_lease_ttl_seconds AdSecretBackend#max_lease_ttl_seconds}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#max_lease_ttl_seconds AdSecretBackend#max_lease_ttl_seconds}
---
@@ -2675,7 +2675,7 @@ max_ttl: typing.Union[int, float]
In seconds, the maximum password time-to-live.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#max_ttl AdSecretBackend#max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#max_ttl AdSecretBackend#max_ttl}
---
@@ -2689,7 +2689,7 @@ namespace: str
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#namespace AdSecretBackend#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#namespace AdSecretBackend#namespace}
---
@@ -2703,7 +2703,7 @@ password_policy: str
Name of the password policy to use to generate passwords.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#password_policy AdSecretBackend#password_policy}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#password_policy AdSecretBackend#password_policy}
---
@@ -2717,7 +2717,7 @@ request_timeout: typing.Union[int, float]
Timeout, in seconds, for the connection when making requests against the server before returning back an error.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#request_timeout AdSecretBackend#request_timeout}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#request_timeout AdSecretBackend#request_timeout}
---
@@ -2731,7 +2731,7 @@ starttls: typing.Union[bool, IResolvable]
Issue a StartTLS command after establishing unencrypted connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#starttls AdSecretBackend#starttls}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#starttls AdSecretBackend#starttls}
---
@@ -2745,7 +2745,7 @@ tls_max_version: str
Maximum TLS version to use. Accepted values are 'tls10', 'tls11', 'tls12' or 'tls13'. Defaults to 'tls12'.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#tls_max_version AdSecretBackend#tls_max_version}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#tls_max_version AdSecretBackend#tls_max_version}
---
@@ -2759,7 +2759,7 @@ tls_min_version: str
Minimum TLS version to use. Accepted values are 'tls10', 'tls11', 'tls12' or 'tls13'. Defaults to 'tls12'.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#tls_min_version AdSecretBackend#tls_min_version}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#tls_min_version AdSecretBackend#tls_min_version}
---
@@ -2773,7 +2773,7 @@ ttl: typing.Union[int, float]
In seconds, the default password time-to-live.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#ttl AdSecretBackend#ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#ttl AdSecretBackend#ttl}
---
@@ -2787,7 +2787,7 @@ upndomain: str
Enables userPrincipalDomain login with [username]@UPNDomain.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#upndomain AdSecretBackend#upndomain}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#upndomain AdSecretBackend#upndomain}
---
@@ -2801,7 +2801,7 @@ url: str
LDAP URL to connect to (default: ldap://127.0.0.1). Multiple URLs can be specified by concatenating them with commas; they will be tried in-order.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#url AdSecretBackend#url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#url AdSecretBackend#url}
---
@@ -2815,7 +2815,7 @@ use_pre111_group_cn_behavior: typing.Union[bool, IResolvable]
In Vault 1.1.1 a fix for handling group CN values of different cases unfortunately introduced a regression that could cause previously defined groups to not be found due to a change in the resulting name. If set true, the pre-1.1.1 behavior for matching group CNs will be used. This is only needed in some upgrade scenarios for backwards compatibility. It is enabled by default if the config is upgraded but disabled by default on new configurations.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#use_pre111_group_cn_behavior AdSecretBackend#use_pre111_group_cn_behavior}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#use_pre111_group_cn_behavior AdSecretBackend#use_pre111_group_cn_behavior}
---
@@ -2829,7 +2829,7 @@ userattr: str
Attribute used for users (default: cn).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#userattr AdSecretBackend#userattr}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#userattr AdSecretBackend#userattr}
---
@@ -2843,7 +2843,7 @@ userdn: str
LDAP domain to use for users (eg: ou=People,dc=example,dc=org).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#userdn AdSecretBackend#userdn}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#userdn AdSecretBackend#userdn}
---
@@ -2859,7 +2859,7 @@ If true, use the Active Directory tokenGroups constructed attribute of the user
This will find all security groups including nested ones.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#use_token_groups AdSecretBackend#use_token_groups}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#use_token_groups AdSecretBackend#use_token_groups}
---
diff --git a/docs/adSecretBackend.typescript.md b/docs/adSecretBackend.typescript.md
index e669691e..b572cbe7 100644
--- a/docs/adSecretBackend.typescript.md
+++ b/docs/adSecretBackend.typescript.md
@@ -4,7 +4,7 @@
### AdSecretBackend
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend vault_ad_secret_backend}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend vault_ad_secret_backend}.
#### Initializers
@@ -698,7 +698,7 @@ The construct id used in the generated config for the AdSecretBackend to import.
The id of the existing AdSecretBackend that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#import import section} in the documentation of this resource for the id to use
---
@@ -1700,7 +1700,7 @@ const adSecretBackendConfig: adSecretBackend.AdSecretBackendConfig = { ... }
| groupattr
| string
| LDAP attribute to follow on objects returned by in order to enumerate user group membership. |
| groupdn
| string
| LDAP search base to use for group membership search (eg: ou=Groups,dc=example,dc=org). |
| groupfilter
| string
| Go template for querying group membership of user. |
-| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#id AdSecretBackend#id}. |
+| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#id AdSecretBackend#id}. |
| insecureTls
| boolean \| cdktf.IResolvable
| Skip LDAP server SSL Certificate verification - insecure and not recommended for production use. |
| lastRotationTolerance
| number
| The number of seconds after a Vault rotation where, if Active Directory shows a later rotation, it should be considered out-of-band. |
| local
| boolean \| cdktf.IResolvable
| Mark the secrets engine as local-only. |
@@ -1802,7 +1802,7 @@ public readonly binddn: string;
Distinguished name of object to bind when performing user and group search.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#binddn AdSecretBackend#binddn}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#binddn AdSecretBackend#binddn}
---
@@ -1816,7 +1816,7 @@ public readonly bindpass: string;
LDAP password for searching for the user DN.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#bindpass AdSecretBackend#bindpass}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#bindpass AdSecretBackend#bindpass}
---
@@ -1830,7 +1830,7 @@ public readonly anonymousGroupSearch: boolean | IResolvable;
Use anonymous binds when performing LDAP group searches (if true the initial credentials will still be used for the initial connection test).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#anonymous_group_search AdSecretBackend#anonymous_group_search}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#anonymous_group_search AdSecretBackend#anonymous_group_search}
---
@@ -1844,7 +1844,7 @@ public readonly backend: string;
The mount path for a backend, for example, the path given in "$ vault auth enable -path=my-ad ad".
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#backend AdSecretBackend#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#backend AdSecretBackend#backend}
---
@@ -1858,7 +1858,7 @@ public readonly caseSensitiveNames: boolean | IResolvable;
If true, case sensitivity will be used when comparing usernames and groups for matching policies.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#case_sensitive_names AdSecretBackend#case_sensitive_names}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#case_sensitive_names AdSecretBackend#case_sensitive_names}
---
@@ -1872,7 +1872,7 @@ public readonly certificate: string;
CA certificate to use when verifying LDAP server certificate, must be x509 PEM encoded.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#certificate AdSecretBackend#certificate}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#certificate AdSecretBackend#certificate}
---
@@ -1886,7 +1886,7 @@ public readonly clientTlsCert: string;
Client certificate to provide to the LDAP server, must be x509 PEM encoded.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#client_tls_cert AdSecretBackend#client_tls_cert}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#client_tls_cert AdSecretBackend#client_tls_cert}
---
@@ -1900,7 +1900,7 @@ public readonly clientTlsKey: string;
Client certificate key to provide to the LDAP server, must be x509 PEM encoded.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#client_tls_key AdSecretBackend#client_tls_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#client_tls_key AdSecretBackend#client_tls_key}
---
@@ -1914,7 +1914,7 @@ public readonly defaultLeaseTtlSeconds: number;
Default lease duration for secrets in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#default_lease_ttl_seconds AdSecretBackend#default_lease_ttl_seconds}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#default_lease_ttl_seconds AdSecretBackend#default_lease_ttl_seconds}
---
@@ -1928,7 +1928,7 @@ public readonly denyNullBind: boolean | IResolvable;
Denies an unauthenticated LDAP bind request if the user's password is empty; defaults to true.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#deny_null_bind AdSecretBackend#deny_null_bind}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#deny_null_bind AdSecretBackend#deny_null_bind}
---
@@ -1942,7 +1942,7 @@ public readonly description: string;
Human-friendly description of the mount for the backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#description AdSecretBackend#description}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#description AdSecretBackend#description}
---
@@ -1956,7 +1956,7 @@ public readonly disableRemount: boolean | IResolvable;
If set, opts out of mount migration on path updates.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#disable_remount AdSecretBackend#disable_remount}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#disable_remount AdSecretBackend#disable_remount}
---
@@ -1970,7 +1970,7 @@ public readonly discoverdn: boolean | IResolvable;
Use anonymous bind to discover the bind DN of a user.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#discoverdn AdSecretBackend#discoverdn}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#discoverdn AdSecretBackend#discoverdn}
---
@@ -1986,7 +1986,7 @@ LDAP attribute to follow on objects returned by in order to enumer
Examples: "cn" or "memberOf", etc. Default: cn
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#groupattr AdSecretBackend#groupattr}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#groupattr AdSecretBackend#groupattr}
---
@@ -2000,7 +2000,7 @@ public readonly groupdn: string;
LDAP search base to use for group membership search (eg: ou=Groups,dc=example,dc=org).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#groupdn AdSecretBackend#groupdn}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#groupdn AdSecretBackend#groupdn}
---
@@ -2016,7 +2016,7 @@ Go template for querying group membership of user.
The template can access the following context variables: UserDN, Username Example: (&(objectClass=group)(member:1.2.840.113556.1.4.1941:={{.UserDN}})) Default: (|(memberUid={{.Username}})(member={{.UserDN}})(uniqueMember={{.UserDN}}))
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#groupfilter AdSecretBackend#groupfilter}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#groupfilter AdSecretBackend#groupfilter}
---
@@ -2028,7 +2028,7 @@ public readonly id: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#id AdSecretBackend#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#id AdSecretBackend#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -2045,7 +2045,7 @@ public readonly insecureTls: boolean | IResolvable;
Skip LDAP server SSL Certificate verification - insecure and not recommended for production use.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#insecure_tls AdSecretBackend#insecure_tls}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#insecure_tls AdSecretBackend#insecure_tls}
---
@@ -2059,7 +2059,7 @@ public readonly lastRotationTolerance: number;
The number of seconds after a Vault rotation where, if Active Directory shows a later rotation, it should be considered out-of-band.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#last_rotation_tolerance AdSecretBackend#last_rotation_tolerance}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#last_rotation_tolerance AdSecretBackend#last_rotation_tolerance}
---
@@ -2075,7 +2075,7 @@ Mark the secrets engine as local-only.
Local engines are not replicated or removed by replication.Tolerance duration to use when checking the last rotation time.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#local AdSecretBackend#local}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#local AdSecretBackend#local}
---
@@ -2089,7 +2089,7 @@ public readonly maxLeaseTtlSeconds: number;
Maximum possible lease duration for secrets in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#max_lease_ttl_seconds AdSecretBackend#max_lease_ttl_seconds}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#max_lease_ttl_seconds AdSecretBackend#max_lease_ttl_seconds}
---
@@ -2103,7 +2103,7 @@ public readonly maxTtl: number;
In seconds, the maximum password time-to-live.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#max_ttl AdSecretBackend#max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#max_ttl AdSecretBackend#max_ttl}
---
@@ -2117,7 +2117,7 @@ public readonly namespace: string;
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#namespace AdSecretBackend#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#namespace AdSecretBackend#namespace}
---
@@ -2131,7 +2131,7 @@ public readonly passwordPolicy: string;
Name of the password policy to use to generate passwords.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#password_policy AdSecretBackend#password_policy}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#password_policy AdSecretBackend#password_policy}
---
@@ -2145,7 +2145,7 @@ public readonly requestTimeout: number;
Timeout, in seconds, for the connection when making requests against the server before returning back an error.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#request_timeout AdSecretBackend#request_timeout}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#request_timeout AdSecretBackend#request_timeout}
---
@@ -2159,7 +2159,7 @@ public readonly starttls: boolean | IResolvable;
Issue a StartTLS command after establishing unencrypted connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#starttls AdSecretBackend#starttls}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#starttls AdSecretBackend#starttls}
---
@@ -2173,7 +2173,7 @@ public readonly tlsMaxVersion: string;
Maximum TLS version to use. Accepted values are 'tls10', 'tls11', 'tls12' or 'tls13'. Defaults to 'tls12'.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#tls_max_version AdSecretBackend#tls_max_version}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#tls_max_version AdSecretBackend#tls_max_version}
---
@@ -2187,7 +2187,7 @@ public readonly tlsMinVersion: string;
Minimum TLS version to use. Accepted values are 'tls10', 'tls11', 'tls12' or 'tls13'. Defaults to 'tls12'.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#tls_min_version AdSecretBackend#tls_min_version}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#tls_min_version AdSecretBackend#tls_min_version}
---
@@ -2201,7 +2201,7 @@ public readonly ttl: number;
In seconds, the default password time-to-live.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#ttl AdSecretBackend#ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#ttl AdSecretBackend#ttl}
---
@@ -2215,7 +2215,7 @@ public readonly upndomain: string;
Enables userPrincipalDomain login with [username]@UPNDomain.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#upndomain AdSecretBackend#upndomain}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#upndomain AdSecretBackend#upndomain}
---
@@ -2229,7 +2229,7 @@ public readonly url: string;
LDAP URL to connect to (default: ldap://127.0.0.1). Multiple URLs can be specified by concatenating them with commas; they will be tried in-order.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#url AdSecretBackend#url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#url AdSecretBackend#url}
---
@@ -2243,7 +2243,7 @@ public readonly usePre111GroupCnBehavior: boolean | IResolvable;
In Vault 1.1.1 a fix for handling group CN values of different cases unfortunately introduced a regression that could cause previously defined groups to not be found due to a change in the resulting name. If set true, the pre-1.1.1 behavior for matching group CNs will be used. This is only needed in some upgrade scenarios for backwards compatibility. It is enabled by default if the config is upgraded but disabled by default on new configurations.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#use_pre111_group_cn_behavior AdSecretBackend#use_pre111_group_cn_behavior}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#use_pre111_group_cn_behavior AdSecretBackend#use_pre111_group_cn_behavior}
---
@@ -2257,7 +2257,7 @@ public readonly userattr: string;
Attribute used for users (default: cn).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#userattr AdSecretBackend#userattr}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#userattr AdSecretBackend#userattr}
---
@@ -2271,7 +2271,7 @@ public readonly userdn: string;
LDAP domain to use for users (eg: ou=People,dc=example,dc=org).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#userdn AdSecretBackend#userdn}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#userdn AdSecretBackend#userdn}
---
@@ -2287,7 +2287,7 @@ If true, use the Active Directory tokenGroups constructed attribute of the user
This will find all security groups including nested ones.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#use_token_groups AdSecretBackend#use_token_groups}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#use_token_groups AdSecretBackend#use_token_groups}
---
diff --git a/docs/adSecretLibrary.csharp.md b/docs/adSecretLibrary.csharp.md
index fe41ab36..aa8ff3ab 100644
--- a/docs/adSecretLibrary.csharp.md
+++ b/docs/adSecretLibrary.csharp.md
@@ -4,7 +4,7 @@
### AdSecretLibrary
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library vault_ad_secret_library}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library vault_ad_secret_library}.
#### Initializers
@@ -502,7 +502,7 @@ The construct id used in the generated config for the AdSecretLibrary to import.
The id of the existing AdSecretLibrary that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#import import section} in the documentation of this resource for the id to use
---
@@ -914,7 +914,7 @@ new AdSecretLibraryConfig {
| Name
| string
| The name of the set of service accounts. |
| ServiceAccountNames
| string[]
| The names of all the service accounts that can be checked out from this set. |
| DisableCheckInEnforcement
| object
| Disable enforcing that service accounts must be checked in by the entity or client token that checked them out. |
-| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#id AdSecretLibrary#id}. |
+| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#id AdSecretLibrary#id}. |
| MaxTtl
| double
| The maximum amount of time, in seconds, a check-out last with renewal before Vault automatically checks it back in. |
| Namespace
| string
| Target namespace. (requires Enterprise). |
| Ttl
| double
| The amount of time, in seconds, a single check-out lasts before Vault automatically checks it back in. |
@@ -1001,7 +1001,7 @@ public string Backend { get; set; }
The mount path for the AD backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#backend AdSecretLibrary#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#backend AdSecretLibrary#backend}
---
@@ -1015,7 +1015,7 @@ public string Name { get; set; }
The name of the set of service accounts.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#name AdSecretLibrary#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#name AdSecretLibrary#name}
---
@@ -1031,7 +1031,7 @@ The names of all the service accounts that can be checked out from this set.
These service accounts must already exist in Active Directory.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#service_account_names AdSecretLibrary#service_account_names}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#service_account_names AdSecretLibrary#service_account_names}
---
@@ -1045,7 +1045,7 @@ public object DisableCheckInEnforcement { get; set; }
Disable enforcing that service accounts must be checked in by the entity or client token that checked them out.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#disable_check_in_enforcement AdSecretLibrary#disable_check_in_enforcement}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#disable_check_in_enforcement AdSecretLibrary#disable_check_in_enforcement}
---
@@ -1057,7 +1057,7 @@ public string Id { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#id AdSecretLibrary#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#id AdSecretLibrary#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1074,7 +1074,7 @@ public double MaxTtl { get; set; }
The maximum amount of time, in seconds, a check-out last with renewal before Vault automatically checks it back in.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#max_ttl AdSecretLibrary#max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#max_ttl AdSecretLibrary#max_ttl}
---
@@ -1088,7 +1088,7 @@ public string Namespace { get; set; }
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#namespace AdSecretLibrary#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#namespace AdSecretLibrary#namespace}
---
@@ -1102,7 +1102,7 @@ public double Ttl { get; set; }
The amount of time, in seconds, a single check-out lasts before Vault automatically checks it back in.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#ttl AdSecretLibrary#ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#ttl AdSecretLibrary#ttl}
---
diff --git a/docs/adSecretLibrary.go.md b/docs/adSecretLibrary.go.md
index c59f3940..7838555a 100644
--- a/docs/adSecretLibrary.go.md
+++ b/docs/adSecretLibrary.go.md
@@ -4,7 +4,7 @@
### AdSecretLibrary
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library vault_ad_secret_library}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library vault_ad_secret_library}.
#### Initializers
@@ -502,7 +502,7 @@ The construct id used in the generated config for the AdSecretLibrary to import.
The id of the existing AdSecretLibrary that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#import import section} in the documentation of this resource for the id to use
---
@@ -914,7 +914,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/adsecretlibrary"
| Name
| *string
| The name of the set of service accounts. |
| ServiceAccountNames
| *[]*string
| The names of all the service accounts that can be checked out from this set. |
| DisableCheckInEnforcement
| interface{}
| Disable enforcing that service accounts must be checked in by the entity or client token that checked them out. |
-| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#id AdSecretLibrary#id}. |
+| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#id AdSecretLibrary#id}. |
| MaxTtl
| *f64
| The maximum amount of time, in seconds, a check-out last with renewal before Vault automatically checks it back in. |
| Namespace
| *string
| Target namespace. (requires Enterprise). |
| Ttl
| *f64
| The amount of time, in seconds, a single check-out lasts before Vault automatically checks it back in. |
@@ -1001,7 +1001,7 @@ Backend *string
The mount path for the AD backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#backend AdSecretLibrary#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#backend AdSecretLibrary#backend}
---
@@ -1015,7 +1015,7 @@ Name *string
The name of the set of service accounts.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#name AdSecretLibrary#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#name AdSecretLibrary#name}
---
@@ -1031,7 +1031,7 @@ The names of all the service accounts that can be checked out from this set.
These service accounts must already exist in Active Directory.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#service_account_names AdSecretLibrary#service_account_names}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#service_account_names AdSecretLibrary#service_account_names}
---
@@ -1045,7 +1045,7 @@ DisableCheckInEnforcement interface{}
Disable enforcing that service accounts must be checked in by the entity or client token that checked them out.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#disable_check_in_enforcement AdSecretLibrary#disable_check_in_enforcement}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#disable_check_in_enforcement AdSecretLibrary#disable_check_in_enforcement}
---
@@ -1057,7 +1057,7 @@ Id *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#id AdSecretLibrary#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#id AdSecretLibrary#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1074,7 +1074,7 @@ MaxTtl *f64
The maximum amount of time, in seconds, a check-out last with renewal before Vault automatically checks it back in.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#max_ttl AdSecretLibrary#max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#max_ttl AdSecretLibrary#max_ttl}
---
@@ -1088,7 +1088,7 @@ Namespace *string
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#namespace AdSecretLibrary#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#namespace AdSecretLibrary#namespace}
---
@@ -1102,7 +1102,7 @@ Ttl *f64
The amount of time, in seconds, a single check-out lasts before Vault automatically checks it back in.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#ttl AdSecretLibrary#ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#ttl AdSecretLibrary#ttl}
---
diff --git a/docs/adSecretLibrary.java.md b/docs/adSecretLibrary.java.md
index ac0ed98f..5d3e34a0 100644
--- a/docs/adSecretLibrary.java.md
+++ b/docs/adSecretLibrary.java.md
@@ -4,7 +4,7 @@
### AdSecretLibrary
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library vault_ad_secret_library}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library vault_ad_secret_library}.
#### Initializers
@@ -50,7 +50,7 @@ AdSecretLibrary.Builder.create(Construct scope, java.lang.String id)
| name
| java.lang.String
| The name of the set of service accounts. |
| serviceAccountNames
| java.util.List
| The names of all the service accounts that can be checked out from this set. |
| disableCheckInEnforcement
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| Disable enforcing that service accounts must be checked in by the entity or client token that checked them out. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#id AdSecretLibrary#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#id AdSecretLibrary#id}. |
| maxTtl
| java.lang.Number
| The maximum amount of time, in seconds, a check-out last with renewal before Vault automatically checks it back in. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
| ttl
| java.lang.Number
| The amount of time, in seconds, a single check-out lasts before Vault automatically checks it back in. |
@@ -123,7 +123,7 @@ Must be unique amongst siblings in the same scope
The mount path for the AD backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#backend AdSecretLibrary#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#backend AdSecretLibrary#backend}
---
@@ -133,7 +133,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The name of the set of service accounts.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#name AdSecretLibrary#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#name AdSecretLibrary#name}
---
@@ -145,7 +145,7 @@ The names of all the service accounts that can be checked out from this set.
These service accounts must already exist in Active Directory.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#service_account_names AdSecretLibrary#service_account_names}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#service_account_names AdSecretLibrary#service_account_names}
---
@@ -155,7 +155,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Disable enforcing that service accounts must be checked in by the entity or client token that checked them out.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#disable_check_in_enforcement AdSecretLibrary#disable_check_in_enforcement}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#disable_check_in_enforcement AdSecretLibrary#disable_check_in_enforcement}
---
@@ -163,7 +163,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#id AdSecretLibrary#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#id AdSecretLibrary#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -176,7 +176,7 @@ If you experience problems setting this value it might not be settable. Please t
The maximum amount of time, in seconds, a check-out last with renewal before Vault automatically checks it back in.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#max_ttl AdSecretLibrary#max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#max_ttl AdSecretLibrary#max_ttl}
---
@@ -186,7 +186,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#namespace AdSecretLibrary#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#namespace AdSecretLibrary#namespace}
---
@@ -196,7 +196,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The amount of time, in seconds, a single check-out lasts before Vault automatically checks it back in.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#ttl AdSecretLibrary#ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#ttl AdSecretLibrary#ttl}
---
@@ -658,7 +658,7 @@ The construct id used in the generated config for the AdSecretLibrary to import.
The id of the existing AdSecretLibrary that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#import import section} in the documentation of this resource for the id to use
---
@@ -1075,7 +1075,7 @@ AdSecretLibraryConfig.builder()
| name
| java.lang.String
| The name of the set of service accounts. |
| serviceAccountNames
| java.util.List
| The names of all the service accounts that can be checked out from this set. |
| disableCheckInEnforcement
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| Disable enforcing that service accounts must be checked in by the entity or client token that checked them out. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#id AdSecretLibrary#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#id AdSecretLibrary#id}. |
| maxTtl
| java.lang.Number
| The maximum amount of time, in seconds, a check-out last with renewal before Vault automatically checks it back in. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
| ttl
| java.lang.Number
| The amount of time, in seconds, a single check-out lasts before Vault automatically checks it back in. |
@@ -1162,7 +1162,7 @@ public java.lang.String getBackend();
The mount path for the AD backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#backend AdSecretLibrary#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#backend AdSecretLibrary#backend}
---
@@ -1176,7 +1176,7 @@ public java.lang.String getName();
The name of the set of service accounts.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#name AdSecretLibrary#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#name AdSecretLibrary#name}
---
@@ -1192,7 +1192,7 @@ The names of all the service accounts that can be checked out from this set.
These service accounts must already exist in Active Directory.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#service_account_names AdSecretLibrary#service_account_names}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#service_account_names AdSecretLibrary#service_account_names}
---
@@ -1206,7 +1206,7 @@ public java.lang.Object getDisableCheckInEnforcement();
Disable enforcing that service accounts must be checked in by the entity or client token that checked them out.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#disable_check_in_enforcement AdSecretLibrary#disable_check_in_enforcement}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#disable_check_in_enforcement AdSecretLibrary#disable_check_in_enforcement}
---
@@ -1218,7 +1218,7 @@ public java.lang.String getId();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#id AdSecretLibrary#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#id AdSecretLibrary#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1235,7 +1235,7 @@ public java.lang.Number getMaxTtl();
The maximum amount of time, in seconds, a check-out last with renewal before Vault automatically checks it back in.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#max_ttl AdSecretLibrary#max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#max_ttl AdSecretLibrary#max_ttl}
---
@@ -1249,7 +1249,7 @@ public java.lang.String getNamespace();
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#namespace AdSecretLibrary#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#namespace AdSecretLibrary#namespace}
---
@@ -1263,7 +1263,7 @@ public java.lang.Number getTtl();
The amount of time, in seconds, a single check-out lasts before Vault automatically checks it back in.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#ttl AdSecretLibrary#ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#ttl AdSecretLibrary#ttl}
---
diff --git a/docs/adSecretLibrary.python.md b/docs/adSecretLibrary.python.md
index 42f1bd5f..6d4babb9 100644
--- a/docs/adSecretLibrary.python.md
+++ b/docs/adSecretLibrary.python.md
@@ -4,7 +4,7 @@
### AdSecretLibrary
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library vault_ad_secret_library}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library vault_ad_secret_library}.
#### Initializers
@@ -47,7 +47,7 @@ adSecretLibrary.AdSecretLibrary(
| name
| str
| The name of the set of service accounts. |
| service_account_names
| typing.List[str]
| The names of all the service accounts that can be checked out from this set. |
| disable_check_in_enforcement
| typing.Union[bool, cdktf.IResolvable]
| Disable enforcing that service accounts must be checked in by the entity or client token that checked them out. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#id AdSecretLibrary#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#id AdSecretLibrary#id}. |
| max_ttl
| typing.Union[int, float]
| The maximum amount of time, in seconds, a check-out last with renewal before Vault automatically checks it back in. |
| namespace
| str
| Target namespace. (requires Enterprise). |
| ttl
| typing.Union[int, float]
| The amount of time, in seconds, a single check-out lasts before Vault automatically checks it back in. |
@@ -120,7 +120,7 @@ Must be unique amongst siblings in the same scope
The mount path for the AD backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#backend AdSecretLibrary#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#backend AdSecretLibrary#backend}
---
@@ -130,7 +130,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The name of the set of service accounts.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#name AdSecretLibrary#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#name AdSecretLibrary#name}
---
@@ -142,7 +142,7 @@ The names of all the service accounts that can be checked out from this set.
These service accounts must already exist in Active Directory.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#service_account_names AdSecretLibrary#service_account_names}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#service_account_names AdSecretLibrary#service_account_names}
---
@@ -152,7 +152,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Disable enforcing that service accounts must be checked in by the entity or client token that checked them out.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#disable_check_in_enforcement AdSecretLibrary#disable_check_in_enforcement}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#disable_check_in_enforcement AdSecretLibrary#disable_check_in_enforcement}
---
@@ -160,7 +160,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#id AdSecretLibrary#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#id AdSecretLibrary#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -173,7 +173,7 @@ If you experience problems setting this value it might not be settable. Please t
The maximum amount of time, in seconds, a check-out last with renewal before Vault automatically checks it back in.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#max_ttl AdSecretLibrary#max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#max_ttl AdSecretLibrary#max_ttl}
---
@@ -183,7 +183,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#namespace AdSecretLibrary#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#namespace AdSecretLibrary#namespace}
---
@@ -193,7 +193,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The amount of time, in seconds, a single check-out lasts before Vault automatically checks it back in.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#ttl AdSecretLibrary#ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#ttl AdSecretLibrary#ttl}
---
@@ -701,7 +701,7 @@ The construct id used in the generated config for the AdSecretLibrary to import.
The id of the existing AdSecretLibrary that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#import import section} in the documentation of this resource for the id to use
---
@@ -1113,7 +1113,7 @@ adSecretLibrary.AdSecretLibraryConfig(
| name
| str
| The name of the set of service accounts. |
| service_account_names
| typing.List[str]
| The names of all the service accounts that can be checked out from this set. |
| disable_check_in_enforcement
| typing.Union[bool, cdktf.IResolvable]
| Disable enforcing that service accounts must be checked in by the entity or client token that checked them out. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#id AdSecretLibrary#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#id AdSecretLibrary#id}. |
| max_ttl
| typing.Union[int, float]
| The maximum amount of time, in seconds, a check-out last with renewal before Vault automatically checks it back in. |
| namespace
| str
| Target namespace. (requires Enterprise). |
| ttl
| typing.Union[int, float]
| The amount of time, in seconds, a single check-out lasts before Vault automatically checks it back in. |
@@ -1200,7 +1200,7 @@ backend: str
The mount path for the AD backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#backend AdSecretLibrary#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#backend AdSecretLibrary#backend}
---
@@ -1214,7 +1214,7 @@ name: str
The name of the set of service accounts.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#name AdSecretLibrary#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#name AdSecretLibrary#name}
---
@@ -1230,7 +1230,7 @@ The names of all the service accounts that can be checked out from this set.
These service accounts must already exist in Active Directory.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#service_account_names AdSecretLibrary#service_account_names}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#service_account_names AdSecretLibrary#service_account_names}
---
@@ -1244,7 +1244,7 @@ disable_check_in_enforcement: typing.Union[bool, IResolvable]
Disable enforcing that service accounts must be checked in by the entity or client token that checked them out.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#disable_check_in_enforcement AdSecretLibrary#disable_check_in_enforcement}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#disable_check_in_enforcement AdSecretLibrary#disable_check_in_enforcement}
---
@@ -1256,7 +1256,7 @@ id: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#id AdSecretLibrary#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#id AdSecretLibrary#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1273,7 +1273,7 @@ max_ttl: typing.Union[int, float]
The maximum amount of time, in seconds, a check-out last with renewal before Vault automatically checks it back in.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#max_ttl AdSecretLibrary#max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#max_ttl AdSecretLibrary#max_ttl}
---
@@ -1287,7 +1287,7 @@ namespace: str
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#namespace AdSecretLibrary#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#namespace AdSecretLibrary#namespace}
---
@@ -1301,7 +1301,7 @@ ttl: typing.Union[int, float]
The amount of time, in seconds, a single check-out lasts before Vault automatically checks it back in.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#ttl AdSecretLibrary#ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#ttl AdSecretLibrary#ttl}
---
diff --git a/docs/adSecretLibrary.typescript.md b/docs/adSecretLibrary.typescript.md
index e1a602a1..a65ac3f6 100644
--- a/docs/adSecretLibrary.typescript.md
+++ b/docs/adSecretLibrary.typescript.md
@@ -4,7 +4,7 @@
### AdSecretLibrary
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library vault_ad_secret_library}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library vault_ad_secret_library}.
#### Initializers
@@ -502,7 +502,7 @@ The construct id used in the generated config for the AdSecretLibrary to import.
The id of the existing AdSecretLibrary that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#import import section} in the documentation of this resource for the id to use
---
@@ -898,7 +898,7 @@ const adSecretLibraryConfig: adSecretLibrary.AdSecretLibraryConfig = { ... }
| name
| string
| The name of the set of service accounts. |
| serviceAccountNames
| string[]
| The names of all the service accounts that can be checked out from this set. |
| disableCheckInEnforcement
| boolean \| cdktf.IResolvable
| Disable enforcing that service accounts must be checked in by the entity or client token that checked them out. |
-| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#id AdSecretLibrary#id}. |
+| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#id AdSecretLibrary#id}. |
| maxTtl
| number
| The maximum amount of time, in seconds, a check-out last with renewal before Vault automatically checks it back in. |
| namespace
| string
| Target namespace. (requires Enterprise). |
| ttl
| number
| The amount of time, in seconds, a single check-out lasts before Vault automatically checks it back in. |
@@ -985,7 +985,7 @@ public readonly backend: string;
The mount path for the AD backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#backend AdSecretLibrary#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#backend AdSecretLibrary#backend}
---
@@ -999,7 +999,7 @@ public readonly name: string;
The name of the set of service accounts.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#name AdSecretLibrary#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#name AdSecretLibrary#name}
---
@@ -1015,7 +1015,7 @@ The names of all the service accounts that can be checked out from this set.
These service accounts must already exist in Active Directory.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#service_account_names AdSecretLibrary#service_account_names}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#service_account_names AdSecretLibrary#service_account_names}
---
@@ -1029,7 +1029,7 @@ public readonly disableCheckInEnforcement: boolean | IResolvable;
Disable enforcing that service accounts must be checked in by the entity or client token that checked them out.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#disable_check_in_enforcement AdSecretLibrary#disable_check_in_enforcement}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#disable_check_in_enforcement AdSecretLibrary#disable_check_in_enforcement}
---
@@ -1041,7 +1041,7 @@ public readonly id: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#id AdSecretLibrary#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#id AdSecretLibrary#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1058,7 +1058,7 @@ public readonly maxTtl: number;
The maximum amount of time, in seconds, a check-out last with renewal before Vault automatically checks it back in.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#max_ttl AdSecretLibrary#max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#max_ttl AdSecretLibrary#max_ttl}
---
@@ -1072,7 +1072,7 @@ public readonly namespace: string;
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#namespace AdSecretLibrary#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#namespace AdSecretLibrary#namespace}
---
@@ -1086,7 +1086,7 @@ public readonly ttl: number;
The amount of time, in seconds, a single check-out lasts before Vault automatically checks it back in.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#ttl AdSecretLibrary#ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#ttl AdSecretLibrary#ttl}
---
diff --git a/docs/adSecretRole.csharp.md b/docs/adSecretRole.csharp.md
index 2da56732..c40fb755 100644
--- a/docs/adSecretRole.csharp.md
+++ b/docs/adSecretRole.csharp.md
@@ -4,7 +4,7 @@
### AdSecretRole
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role vault_ad_secret_role}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role vault_ad_secret_role}.
#### Initializers
@@ -488,7 +488,7 @@ The construct id used in the generated config for the AdSecretRole to import.
The id of the existing AdSecretRole that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#import import section} in the documentation of this resource for the id to use
---
@@ -875,7 +875,7 @@ new AdSecretRoleConfig {
| Backend
| string
| The mount path for the AD backend. |
| Role
| string
| Name of the role. |
| ServiceAccountName
| string
| The username/logon name for the service account with which this role will be associated. |
-| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#id AdSecretRole#id}. |
+| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#id AdSecretRole#id}. |
| Namespace
| string
| Target namespace. (requires Enterprise). |
| Ttl
| double
| In seconds, the default password time-to-live. |
@@ -961,7 +961,7 @@ public string Backend { get; set; }
The mount path for the AD backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#backend AdSecretRole#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#backend AdSecretRole#backend}
---
@@ -975,7 +975,7 @@ public string Role { get; set; }
Name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#role AdSecretRole#role}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#role AdSecretRole#role}
---
@@ -989,7 +989,7 @@ public string ServiceAccountName { get; set; }
The username/logon name for the service account with which this role will be associated.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#service_account_name AdSecretRole#service_account_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#service_account_name AdSecretRole#service_account_name}
---
@@ -1001,7 +1001,7 @@ public string Id { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#id AdSecretRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#id AdSecretRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1018,7 +1018,7 @@ public string Namespace { get; set; }
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#namespace AdSecretRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#namespace AdSecretRole#namespace}
---
@@ -1032,7 +1032,7 @@ public double Ttl { get; set; }
In seconds, the default password time-to-live.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#ttl AdSecretRole#ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#ttl AdSecretRole#ttl}
---
diff --git a/docs/adSecretRole.go.md b/docs/adSecretRole.go.md
index 69f1f28b..78ee5f79 100644
--- a/docs/adSecretRole.go.md
+++ b/docs/adSecretRole.go.md
@@ -4,7 +4,7 @@
### AdSecretRole
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role vault_ad_secret_role}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role vault_ad_secret_role}.
#### Initializers
@@ -488,7 +488,7 @@ The construct id used in the generated config for the AdSecretRole to import.
The id of the existing AdSecretRole that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#import import section} in the documentation of this resource for the id to use
---
@@ -875,7 +875,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/adsecretrole"
| Backend
| *string
| The mount path for the AD backend. |
| Role
| *string
| Name of the role. |
| ServiceAccountName
| *string
| The username/logon name for the service account with which this role will be associated. |
-| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#id AdSecretRole#id}. |
+| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#id AdSecretRole#id}. |
| Namespace
| *string
| Target namespace. (requires Enterprise). |
| Ttl
| *f64
| In seconds, the default password time-to-live. |
@@ -961,7 +961,7 @@ Backend *string
The mount path for the AD backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#backend AdSecretRole#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#backend AdSecretRole#backend}
---
@@ -975,7 +975,7 @@ Role *string
Name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#role AdSecretRole#role}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#role AdSecretRole#role}
---
@@ -989,7 +989,7 @@ ServiceAccountName *string
The username/logon name for the service account with which this role will be associated.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#service_account_name AdSecretRole#service_account_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#service_account_name AdSecretRole#service_account_name}
---
@@ -1001,7 +1001,7 @@ Id *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#id AdSecretRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#id AdSecretRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1018,7 +1018,7 @@ Namespace *string
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#namespace AdSecretRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#namespace AdSecretRole#namespace}
---
@@ -1032,7 +1032,7 @@ Ttl *f64
In seconds, the default password time-to-live.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#ttl AdSecretRole#ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#ttl AdSecretRole#ttl}
---
diff --git a/docs/adSecretRole.java.md b/docs/adSecretRole.java.md
index 635787f5..d3b1994d 100644
--- a/docs/adSecretRole.java.md
+++ b/docs/adSecretRole.java.md
@@ -4,7 +4,7 @@
### AdSecretRole
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role vault_ad_secret_role}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role vault_ad_secret_role}.
#### Initializers
@@ -46,7 +46,7 @@ AdSecretRole.Builder.create(Construct scope, java.lang.String id)
| backend
| java.lang.String
| The mount path for the AD backend. |
| role
| java.lang.String
| Name of the role. |
| serviceAccountName
| java.lang.String
| The username/logon name for the service account with which this role will be associated. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#id AdSecretRole#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#id AdSecretRole#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
| ttl
| java.lang.Number
| In seconds, the default password time-to-live. |
@@ -118,7 +118,7 @@ Must be unique amongst siblings in the same scope
The mount path for the AD backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#backend AdSecretRole#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#backend AdSecretRole#backend}
---
@@ -128,7 +128,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#role AdSecretRole#role}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#role AdSecretRole#role}
---
@@ -138,7 +138,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The username/logon name for the service account with which this role will be associated.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#service_account_name AdSecretRole#service_account_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#service_account_name AdSecretRole#service_account_name}
---
@@ -146,7 +146,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#id AdSecretRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#id AdSecretRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -159,7 +159,7 @@ If you experience problems setting this value it might not be settable. Please t
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#namespace AdSecretRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#namespace AdSecretRole#namespace}
---
@@ -169,7 +169,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
In seconds, the default password time-to-live.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#ttl AdSecretRole#ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#ttl AdSecretRole#ttl}
---
@@ -617,7 +617,7 @@ The construct id used in the generated config for the AdSecretRole to import.
The id of the existing AdSecretRole that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#import import section} in the documentation of this resource for the id to use
---
@@ -1008,7 +1008,7 @@ AdSecretRoleConfig.builder()
| backend
| java.lang.String
| The mount path for the AD backend. |
| role
| java.lang.String
| Name of the role. |
| serviceAccountName
| java.lang.String
| The username/logon name for the service account with which this role will be associated. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#id AdSecretRole#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#id AdSecretRole#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
| ttl
| java.lang.Number
| In seconds, the default password time-to-live. |
@@ -1094,7 +1094,7 @@ public java.lang.String getBackend();
The mount path for the AD backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#backend AdSecretRole#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#backend AdSecretRole#backend}
---
@@ -1108,7 +1108,7 @@ public java.lang.String getRole();
Name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#role AdSecretRole#role}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#role AdSecretRole#role}
---
@@ -1122,7 +1122,7 @@ public java.lang.String getServiceAccountName();
The username/logon name for the service account with which this role will be associated.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#service_account_name AdSecretRole#service_account_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#service_account_name AdSecretRole#service_account_name}
---
@@ -1134,7 +1134,7 @@ public java.lang.String getId();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#id AdSecretRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#id AdSecretRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1151,7 +1151,7 @@ public java.lang.String getNamespace();
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#namespace AdSecretRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#namespace AdSecretRole#namespace}
---
@@ -1165,7 +1165,7 @@ public java.lang.Number getTtl();
In seconds, the default password time-to-live.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#ttl AdSecretRole#ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#ttl AdSecretRole#ttl}
---
diff --git a/docs/adSecretRole.python.md b/docs/adSecretRole.python.md
index 0133da7e..1ef8655c 100644
--- a/docs/adSecretRole.python.md
+++ b/docs/adSecretRole.python.md
@@ -4,7 +4,7 @@
### AdSecretRole
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role vault_ad_secret_role}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role vault_ad_secret_role}.
#### Initializers
@@ -44,7 +44,7 @@ adSecretRole.AdSecretRole(
| backend
| str
| The mount path for the AD backend. |
| role
| str
| Name of the role. |
| service_account_name
| str
| The username/logon name for the service account with which this role will be associated. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#id AdSecretRole#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#id AdSecretRole#id}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
| ttl
| typing.Union[int, float]
| In seconds, the default password time-to-live. |
@@ -116,7 +116,7 @@ Must be unique amongst siblings in the same scope
The mount path for the AD backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#backend AdSecretRole#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#backend AdSecretRole#backend}
---
@@ -126,7 +126,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#role AdSecretRole#role}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#role AdSecretRole#role}
---
@@ -136,7 +136,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The username/logon name for the service account with which this role will be associated.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#service_account_name AdSecretRole#service_account_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#service_account_name AdSecretRole#service_account_name}
---
@@ -144,7 +144,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#id AdSecretRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#id AdSecretRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -157,7 +157,7 @@ If you experience problems setting this value it might not be settable. Please t
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#namespace AdSecretRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#namespace AdSecretRole#namespace}
---
@@ -167,7 +167,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
In seconds, the default password time-to-live.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#ttl AdSecretRole#ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#ttl AdSecretRole#ttl}
---
@@ -661,7 +661,7 @@ The construct id used in the generated config for the AdSecretRole to import.
The id of the existing AdSecretRole that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#import import section} in the documentation of this resource for the id to use
---
@@ -1048,7 +1048,7 @@ adSecretRole.AdSecretRoleConfig(
| backend
| str
| The mount path for the AD backend. |
| role
| str
| Name of the role. |
| service_account_name
| str
| The username/logon name for the service account with which this role will be associated. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#id AdSecretRole#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#id AdSecretRole#id}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
| ttl
| typing.Union[int, float]
| In seconds, the default password time-to-live. |
@@ -1134,7 +1134,7 @@ backend: str
The mount path for the AD backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#backend AdSecretRole#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#backend AdSecretRole#backend}
---
@@ -1148,7 +1148,7 @@ role: str
Name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#role AdSecretRole#role}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#role AdSecretRole#role}
---
@@ -1162,7 +1162,7 @@ service_account_name: str
The username/logon name for the service account with which this role will be associated.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#service_account_name AdSecretRole#service_account_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#service_account_name AdSecretRole#service_account_name}
---
@@ -1174,7 +1174,7 @@ id: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#id AdSecretRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#id AdSecretRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1191,7 +1191,7 @@ namespace: str
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#namespace AdSecretRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#namespace AdSecretRole#namespace}
---
@@ -1205,7 +1205,7 @@ ttl: typing.Union[int, float]
In seconds, the default password time-to-live.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#ttl AdSecretRole#ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#ttl AdSecretRole#ttl}
---
diff --git a/docs/adSecretRole.typescript.md b/docs/adSecretRole.typescript.md
index bdd1519a..a64967e4 100644
--- a/docs/adSecretRole.typescript.md
+++ b/docs/adSecretRole.typescript.md
@@ -4,7 +4,7 @@
### AdSecretRole
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role vault_ad_secret_role}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role vault_ad_secret_role}.
#### Initializers
@@ -488,7 +488,7 @@ The construct id used in the generated config for the AdSecretRole to import.
The id of the existing AdSecretRole that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#import import section} in the documentation of this resource for the id to use
---
@@ -861,7 +861,7 @@ const adSecretRoleConfig: adSecretRole.AdSecretRoleConfig = { ... }
| backend
| string
| The mount path for the AD backend. |
| role
| string
| Name of the role. |
| serviceAccountName
| string
| The username/logon name for the service account with which this role will be associated. |
-| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#id AdSecretRole#id}. |
+| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#id AdSecretRole#id}. |
| namespace
| string
| Target namespace. (requires Enterprise). |
| ttl
| number
| In seconds, the default password time-to-live. |
@@ -947,7 +947,7 @@ public readonly backend: string;
The mount path for the AD backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#backend AdSecretRole#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#backend AdSecretRole#backend}
---
@@ -961,7 +961,7 @@ public readonly role: string;
Name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#role AdSecretRole#role}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#role AdSecretRole#role}
---
@@ -975,7 +975,7 @@ public readonly serviceAccountName: string;
The username/logon name for the service account with which this role will be associated.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#service_account_name AdSecretRole#service_account_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#service_account_name AdSecretRole#service_account_name}
---
@@ -987,7 +987,7 @@ public readonly id: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#id AdSecretRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#id AdSecretRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1004,7 +1004,7 @@ public readonly namespace: string;
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#namespace AdSecretRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#namespace AdSecretRole#namespace}
---
@@ -1018,7 +1018,7 @@ public readonly ttl: number;
In seconds, the default password time-to-live.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#ttl AdSecretRole#ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#ttl AdSecretRole#ttl}
---
diff --git a/docs/alicloudAuthBackendRole.csharp.md b/docs/alicloudAuthBackendRole.csharp.md
index f634a5fb..24f36ebe 100644
--- a/docs/alicloudAuthBackendRole.csharp.md
+++ b/docs/alicloudAuthBackendRole.csharp.md
@@ -4,7 +4,7 @@
### AlicloudAuthBackendRole
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role vault_alicloud_auth_backend_role}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role vault_alicloud_auth_backend_role}.
#### Initializers
@@ -551,7 +551,7 @@ The construct id used in the generated config for the AlicloudAuthBackendRole to
The id of the existing AlicloudAuthBackendRole that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#import import section} in the documentation of this resource for the id to use
---
@@ -1100,7 +1100,7 @@ new AlicloudAuthBackendRoleConfig {
| Arn
| string
| The role's arn. |
| Role
| string
| Name of the role. Must correspond with the name of the role reflected in the arn. |
| Backend
| string
| Auth backend. |
-| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#id AlicloudAuthBackendRole#id}. |
+| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#id AlicloudAuthBackendRole#id}. |
| Namespace
| string
| Target namespace. (requires Enterprise). |
| TokenBoundCidrs
| string[]
| Specifies the blocks of IP addresses which are allowed to use the generated token. |
| TokenExplicitMaxTtl
| double
| Generated Token's Explicit Maximum TTL in seconds. |
@@ -1194,7 +1194,7 @@ public string Arn { get; set; }
The role's arn.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#arn AlicloudAuthBackendRole#arn}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#arn AlicloudAuthBackendRole#arn}
---
@@ -1208,7 +1208,7 @@ public string Role { get; set; }
Name of the role. Must correspond with the name of the role reflected in the arn.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#role AlicloudAuthBackendRole#role}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#role AlicloudAuthBackendRole#role}
---
@@ -1222,7 +1222,7 @@ public string Backend { get; set; }
Auth backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#backend AlicloudAuthBackendRole#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#backend AlicloudAuthBackendRole#backend}
---
@@ -1234,7 +1234,7 @@ public string Id { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#id AlicloudAuthBackendRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#id AlicloudAuthBackendRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1251,7 +1251,7 @@ public string Namespace { get; set; }
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#namespace AlicloudAuthBackendRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#namespace AlicloudAuthBackendRole#namespace}
---
@@ -1265,7 +1265,7 @@ public string[] TokenBoundCidrs { get; set; }
Specifies the blocks of IP addresses which are allowed to use the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_bound_cidrs AlicloudAuthBackendRole#token_bound_cidrs}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_bound_cidrs AlicloudAuthBackendRole#token_bound_cidrs}
---
@@ -1279,7 +1279,7 @@ public double TokenExplicitMaxTtl { get; set; }
Generated Token's Explicit Maximum TTL in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_explicit_max_ttl AlicloudAuthBackendRole#token_explicit_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_explicit_max_ttl AlicloudAuthBackendRole#token_explicit_max_ttl}
---
@@ -1293,7 +1293,7 @@ public double TokenMaxTtl { get; set; }
The maximum lifetime of the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_max_ttl AlicloudAuthBackendRole#token_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_max_ttl AlicloudAuthBackendRole#token_max_ttl}
---
@@ -1307,7 +1307,7 @@ public object TokenNoDefaultPolicy { get; set; }
If true, the 'default' policy will not automatically be added to generated tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_no_default_policy AlicloudAuthBackendRole#token_no_default_policy}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_no_default_policy AlicloudAuthBackendRole#token_no_default_policy}
---
@@ -1321,7 +1321,7 @@ public double TokenNumUses { get; set; }
The maximum number of times a token may be used, a value of zero means unlimited.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_num_uses AlicloudAuthBackendRole#token_num_uses}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_num_uses AlicloudAuthBackendRole#token_num_uses}
---
@@ -1335,7 +1335,7 @@ public double TokenPeriod { get; set; }
Generated Token's Period.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_period AlicloudAuthBackendRole#token_period}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_period AlicloudAuthBackendRole#token_period}
---
@@ -1349,7 +1349,7 @@ public string[] TokenPolicies { get; set; }
Generated Token's Policies.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_policies AlicloudAuthBackendRole#token_policies}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_policies AlicloudAuthBackendRole#token_policies}
---
@@ -1363,7 +1363,7 @@ public double TokenTtl { get; set; }
The initial ttl of the token to generate in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_ttl AlicloudAuthBackendRole#token_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_ttl AlicloudAuthBackendRole#token_ttl}
---
@@ -1377,7 +1377,7 @@ public string TokenType { get; set; }
The type of token to generate, service or batch.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_type AlicloudAuthBackendRole#token_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_type AlicloudAuthBackendRole#token_type}
---
diff --git a/docs/alicloudAuthBackendRole.go.md b/docs/alicloudAuthBackendRole.go.md
index 6ebdb743..e00a1ba7 100644
--- a/docs/alicloudAuthBackendRole.go.md
+++ b/docs/alicloudAuthBackendRole.go.md
@@ -4,7 +4,7 @@
### AlicloudAuthBackendRole
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role vault_alicloud_auth_backend_role}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role vault_alicloud_auth_backend_role}.
#### Initializers
@@ -551,7 +551,7 @@ The construct id used in the generated config for the AlicloudAuthBackendRole to
The id of the existing AlicloudAuthBackendRole that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#import import section} in the documentation of this resource for the id to use
---
@@ -1100,7 +1100,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/alicloudauthbackendro
| Arn
| *string
| The role's arn. |
| Role
| *string
| Name of the role. Must correspond with the name of the role reflected in the arn. |
| Backend
| *string
| Auth backend. |
-| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#id AlicloudAuthBackendRole#id}. |
+| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#id AlicloudAuthBackendRole#id}. |
| Namespace
| *string
| Target namespace. (requires Enterprise). |
| TokenBoundCidrs
| *[]*string
| Specifies the blocks of IP addresses which are allowed to use the generated token. |
| TokenExplicitMaxTtl
| *f64
| Generated Token's Explicit Maximum TTL in seconds. |
@@ -1194,7 +1194,7 @@ Arn *string
The role's arn.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#arn AlicloudAuthBackendRole#arn}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#arn AlicloudAuthBackendRole#arn}
---
@@ -1208,7 +1208,7 @@ Role *string
Name of the role. Must correspond with the name of the role reflected in the arn.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#role AlicloudAuthBackendRole#role}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#role AlicloudAuthBackendRole#role}
---
@@ -1222,7 +1222,7 @@ Backend *string
Auth backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#backend AlicloudAuthBackendRole#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#backend AlicloudAuthBackendRole#backend}
---
@@ -1234,7 +1234,7 @@ Id *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#id AlicloudAuthBackendRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#id AlicloudAuthBackendRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1251,7 +1251,7 @@ Namespace *string
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#namespace AlicloudAuthBackendRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#namespace AlicloudAuthBackendRole#namespace}
---
@@ -1265,7 +1265,7 @@ TokenBoundCidrs *[]*string
Specifies the blocks of IP addresses which are allowed to use the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_bound_cidrs AlicloudAuthBackendRole#token_bound_cidrs}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_bound_cidrs AlicloudAuthBackendRole#token_bound_cidrs}
---
@@ -1279,7 +1279,7 @@ TokenExplicitMaxTtl *f64
Generated Token's Explicit Maximum TTL in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_explicit_max_ttl AlicloudAuthBackendRole#token_explicit_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_explicit_max_ttl AlicloudAuthBackendRole#token_explicit_max_ttl}
---
@@ -1293,7 +1293,7 @@ TokenMaxTtl *f64
The maximum lifetime of the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_max_ttl AlicloudAuthBackendRole#token_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_max_ttl AlicloudAuthBackendRole#token_max_ttl}
---
@@ -1307,7 +1307,7 @@ TokenNoDefaultPolicy interface{}
If true, the 'default' policy will not automatically be added to generated tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_no_default_policy AlicloudAuthBackendRole#token_no_default_policy}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_no_default_policy AlicloudAuthBackendRole#token_no_default_policy}
---
@@ -1321,7 +1321,7 @@ TokenNumUses *f64
The maximum number of times a token may be used, a value of zero means unlimited.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_num_uses AlicloudAuthBackendRole#token_num_uses}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_num_uses AlicloudAuthBackendRole#token_num_uses}
---
@@ -1335,7 +1335,7 @@ TokenPeriod *f64
Generated Token's Period.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_period AlicloudAuthBackendRole#token_period}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_period AlicloudAuthBackendRole#token_period}
---
@@ -1349,7 +1349,7 @@ TokenPolicies *[]*string
Generated Token's Policies.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_policies AlicloudAuthBackendRole#token_policies}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_policies AlicloudAuthBackendRole#token_policies}
---
@@ -1363,7 +1363,7 @@ TokenTtl *f64
The initial ttl of the token to generate in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_ttl AlicloudAuthBackendRole#token_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_ttl AlicloudAuthBackendRole#token_ttl}
---
@@ -1377,7 +1377,7 @@ TokenType *string
The type of token to generate, service or batch.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_type AlicloudAuthBackendRole#token_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_type AlicloudAuthBackendRole#token_type}
---
diff --git a/docs/alicloudAuthBackendRole.java.md b/docs/alicloudAuthBackendRole.java.md
index c01edbec..74b19d5e 100644
--- a/docs/alicloudAuthBackendRole.java.md
+++ b/docs/alicloudAuthBackendRole.java.md
@@ -4,7 +4,7 @@
### AlicloudAuthBackendRole
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role vault_alicloud_auth_backend_role}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role vault_alicloud_auth_backend_role}.
#### Initializers
@@ -55,7 +55,7 @@ AlicloudAuthBackendRole.Builder.create(Construct scope, java.lang.String id)
| arn
| java.lang.String
| The role's arn. |
| role
| java.lang.String
| Name of the role. Must correspond with the name of the role reflected in the arn. |
| backend
| java.lang.String
| Auth backend. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#id AlicloudAuthBackendRole#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#id AlicloudAuthBackendRole#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
| tokenBoundCidrs
| java.util.List
| Specifies the blocks of IP addresses which are allowed to use the generated token. |
| tokenExplicitMaxTtl
| java.lang.Number
| Generated Token's Explicit Maximum TTL in seconds. |
@@ -135,7 +135,7 @@ Must be unique amongst siblings in the same scope
The role's arn.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#arn AlicloudAuthBackendRole#arn}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#arn AlicloudAuthBackendRole#arn}
---
@@ -145,7 +145,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Name of the role. Must correspond with the name of the role reflected in the arn.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#role AlicloudAuthBackendRole#role}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#role AlicloudAuthBackendRole#role}
---
@@ -155,7 +155,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Auth backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#backend AlicloudAuthBackendRole#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#backend AlicloudAuthBackendRole#backend}
---
@@ -163,7 +163,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#id AlicloudAuthBackendRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#id AlicloudAuthBackendRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -176,7 +176,7 @@ If you experience problems setting this value it might not be settable. Please t
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#namespace AlicloudAuthBackendRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#namespace AlicloudAuthBackendRole#namespace}
---
@@ -186,7 +186,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Specifies the blocks of IP addresses which are allowed to use the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_bound_cidrs AlicloudAuthBackendRole#token_bound_cidrs}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_bound_cidrs AlicloudAuthBackendRole#token_bound_cidrs}
---
@@ -196,7 +196,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Generated Token's Explicit Maximum TTL in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_explicit_max_ttl AlicloudAuthBackendRole#token_explicit_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_explicit_max_ttl AlicloudAuthBackendRole#token_explicit_max_ttl}
---
@@ -206,7 +206,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The maximum lifetime of the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_max_ttl AlicloudAuthBackendRole#token_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_max_ttl AlicloudAuthBackendRole#token_max_ttl}
---
@@ -216,7 +216,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
If true, the 'default' policy will not automatically be added to generated tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_no_default_policy AlicloudAuthBackendRole#token_no_default_policy}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_no_default_policy AlicloudAuthBackendRole#token_no_default_policy}
---
@@ -226,7 +226,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The maximum number of times a token may be used, a value of zero means unlimited.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_num_uses AlicloudAuthBackendRole#token_num_uses}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_num_uses AlicloudAuthBackendRole#token_num_uses}
---
@@ -236,7 +236,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Generated Token's Period.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_period AlicloudAuthBackendRole#token_period}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_period AlicloudAuthBackendRole#token_period}
---
@@ -246,7 +246,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Generated Token's Policies.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_policies AlicloudAuthBackendRole#token_policies}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_policies AlicloudAuthBackendRole#token_policies}
---
@@ -256,7 +256,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The initial ttl of the token to generate in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_ttl AlicloudAuthBackendRole#token_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_ttl AlicloudAuthBackendRole#token_ttl}
---
@@ -266,7 +266,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The type of token to generate, service or batch.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_type AlicloudAuthBackendRole#token_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_type AlicloudAuthBackendRole#token_type}
---
@@ -777,7 +777,7 @@ The construct id used in the generated config for the AlicloudAuthBackendRole to
The id of the existing AlicloudAuthBackendRole that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#import import section} in the documentation of this resource for the id to use
---
@@ -1331,7 +1331,7 @@ AlicloudAuthBackendRoleConfig.builder()
| arn
| java.lang.String
| The role's arn. |
| role
| java.lang.String
| Name of the role. Must correspond with the name of the role reflected in the arn. |
| backend
| java.lang.String
| Auth backend. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#id AlicloudAuthBackendRole#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#id AlicloudAuthBackendRole#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
| tokenBoundCidrs
| java.util.List
| Specifies the blocks of IP addresses which are allowed to use the generated token. |
| tokenExplicitMaxTtl
| java.lang.Number
| Generated Token's Explicit Maximum TTL in seconds. |
@@ -1425,7 +1425,7 @@ public java.lang.String getArn();
The role's arn.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#arn AlicloudAuthBackendRole#arn}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#arn AlicloudAuthBackendRole#arn}
---
@@ -1439,7 +1439,7 @@ public java.lang.String getRole();
Name of the role. Must correspond with the name of the role reflected in the arn.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#role AlicloudAuthBackendRole#role}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#role AlicloudAuthBackendRole#role}
---
@@ -1453,7 +1453,7 @@ public java.lang.String getBackend();
Auth backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#backend AlicloudAuthBackendRole#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#backend AlicloudAuthBackendRole#backend}
---
@@ -1465,7 +1465,7 @@ public java.lang.String getId();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#id AlicloudAuthBackendRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#id AlicloudAuthBackendRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1482,7 +1482,7 @@ public java.lang.String getNamespace();
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#namespace AlicloudAuthBackendRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#namespace AlicloudAuthBackendRole#namespace}
---
@@ -1496,7 +1496,7 @@ public java.util.List getTokenBoundCidrs();
Specifies the blocks of IP addresses which are allowed to use the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_bound_cidrs AlicloudAuthBackendRole#token_bound_cidrs}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_bound_cidrs AlicloudAuthBackendRole#token_bound_cidrs}
---
@@ -1510,7 +1510,7 @@ public java.lang.Number getTokenExplicitMaxTtl();
Generated Token's Explicit Maximum TTL in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_explicit_max_ttl AlicloudAuthBackendRole#token_explicit_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_explicit_max_ttl AlicloudAuthBackendRole#token_explicit_max_ttl}
---
@@ -1524,7 +1524,7 @@ public java.lang.Number getTokenMaxTtl();
The maximum lifetime of the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_max_ttl AlicloudAuthBackendRole#token_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_max_ttl AlicloudAuthBackendRole#token_max_ttl}
---
@@ -1538,7 +1538,7 @@ public java.lang.Object getTokenNoDefaultPolicy();
If true, the 'default' policy will not automatically be added to generated tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_no_default_policy AlicloudAuthBackendRole#token_no_default_policy}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_no_default_policy AlicloudAuthBackendRole#token_no_default_policy}
---
@@ -1552,7 +1552,7 @@ public java.lang.Number getTokenNumUses();
The maximum number of times a token may be used, a value of zero means unlimited.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_num_uses AlicloudAuthBackendRole#token_num_uses}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_num_uses AlicloudAuthBackendRole#token_num_uses}
---
@@ -1566,7 +1566,7 @@ public java.lang.Number getTokenPeriod();
Generated Token's Period.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_period AlicloudAuthBackendRole#token_period}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_period AlicloudAuthBackendRole#token_period}
---
@@ -1580,7 +1580,7 @@ public java.util.List getTokenPolicies();
Generated Token's Policies.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_policies AlicloudAuthBackendRole#token_policies}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_policies AlicloudAuthBackendRole#token_policies}
---
@@ -1594,7 +1594,7 @@ public java.lang.Number getTokenTtl();
The initial ttl of the token to generate in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_ttl AlicloudAuthBackendRole#token_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_ttl AlicloudAuthBackendRole#token_ttl}
---
@@ -1608,7 +1608,7 @@ public java.lang.String getTokenType();
The type of token to generate, service or batch.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_type AlicloudAuthBackendRole#token_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_type AlicloudAuthBackendRole#token_type}
---
diff --git a/docs/alicloudAuthBackendRole.python.md b/docs/alicloudAuthBackendRole.python.md
index f216e879..a65473c6 100644
--- a/docs/alicloudAuthBackendRole.python.md
+++ b/docs/alicloudAuthBackendRole.python.md
@@ -4,7 +4,7 @@
### AlicloudAuthBackendRole
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role vault_alicloud_auth_backend_role}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role vault_alicloud_auth_backend_role}.
#### Initializers
@@ -52,7 +52,7 @@ alicloudAuthBackendRole.AlicloudAuthBackendRole(
| arn
| str
| The role's arn. |
| role
| str
| Name of the role. Must correspond with the name of the role reflected in the arn. |
| backend
| str
| Auth backend. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#id AlicloudAuthBackendRole#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#id AlicloudAuthBackendRole#id}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
| token_bound_cidrs
| typing.List[str]
| Specifies the blocks of IP addresses which are allowed to use the generated token. |
| token_explicit_max_ttl
| typing.Union[int, float]
| Generated Token's Explicit Maximum TTL in seconds. |
@@ -132,7 +132,7 @@ Must be unique amongst siblings in the same scope
The role's arn.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#arn AlicloudAuthBackendRole#arn}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#arn AlicloudAuthBackendRole#arn}
---
@@ -142,7 +142,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Name of the role. Must correspond with the name of the role reflected in the arn.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#role AlicloudAuthBackendRole#role}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#role AlicloudAuthBackendRole#role}
---
@@ -152,7 +152,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Auth backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#backend AlicloudAuthBackendRole#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#backend AlicloudAuthBackendRole#backend}
---
@@ -160,7 +160,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#id AlicloudAuthBackendRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#id AlicloudAuthBackendRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -173,7 +173,7 @@ If you experience problems setting this value it might not be settable. Please t
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#namespace AlicloudAuthBackendRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#namespace AlicloudAuthBackendRole#namespace}
---
@@ -183,7 +183,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Specifies the blocks of IP addresses which are allowed to use the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_bound_cidrs AlicloudAuthBackendRole#token_bound_cidrs}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_bound_cidrs AlicloudAuthBackendRole#token_bound_cidrs}
---
@@ -193,7 +193,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Generated Token's Explicit Maximum TTL in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_explicit_max_ttl AlicloudAuthBackendRole#token_explicit_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_explicit_max_ttl AlicloudAuthBackendRole#token_explicit_max_ttl}
---
@@ -203,7 +203,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The maximum lifetime of the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_max_ttl AlicloudAuthBackendRole#token_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_max_ttl AlicloudAuthBackendRole#token_max_ttl}
---
@@ -213,7 +213,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
If true, the 'default' policy will not automatically be added to generated tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_no_default_policy AlicloudAuthBackendRole#token_no_default_policy}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_no_default_policy AlicloudAuthBackendRole#token_no_default_policy}
---
@@ -223,7 +223,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The maximum number of times a token may be used, a value of zero means unlimited.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_num_uses AlicloudAuthBackendRole#token_num_uses}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_num_uses AlicloudAuthBackendRole#token_num_uses}
---
@@ -233,7 +233,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Generated Token's Period.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_period AlicloudAuthBackendRole#token_period}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_period AlicloudAuthBackendRole#token_period}
---
@@ -243,7 +243,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Generated Token's Policies.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_policies AlicloudAuthBackendRole#token_policies}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_policies AlicloudAuthBackendRole#token_policies}
---
@@ -253,7 +253,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The initial ttl of the token to generate in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_ttl AlicloudAuthBackendRole#token_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_ttl AlicloudAuthBackendRole#token_ttl}
---
@@ -263,7 +263,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The type of token to generate, service or batch.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_type AlicloudAuthBackendRole#token_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_type AlicloudAuthBackendRole#token_type}
---
@@ -820,7 +820,7 @@ The construct id used in the generated config for the AlicloudAuthBackendRole to
The id of the existing AlicloudAuthBackendRole that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#import import section} in the documentation of this resource for the id to use
---
@@ -1369,7 +1369,7 @@ alicloudAuthBackendRole.AlicloudAuthBackendRoleConfig(
| arn
| str
| The role's arn. |
| role
| str
| Name of the role. Must correspond with the name of the role reflected in the arn. |
| backend
| str
| Auth backend. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#id AlicloudAuthBackendRole#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#id AlicloudAuthBackendRole#id}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
| token_bound_cidrs
| typing.List[str]
| Specifies the blocks of IP addresses which are allowed to use the generated token. |
| token_explicit_max_ttl
| typing.Union[int, float]
| Generated Token's Explicit Maximum TTL in seconds. |
@@ -1463,7 +1463,7 @@ arn: str
The role's arn.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#arn AlicloudAuthBackendRole#arn}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#arn AlicloudAuthBackendRole#arn}
---
@@ -1477,7 +1477,7 @@ role: str
Name of the role. Must correspond with the name of the role reflected in the arn.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#role AlicloudAuthBackendRole#role}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#role AlicloudAuthBackendRole#role}
---
@@ -1491,7 +1491,7 @@ backend: str
Auth backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#backend AlicloudAuthBackendRole#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#backend AlicloudAuthBackendRole#backend}
---
@@ -1503,7 +1503,7 @@ id: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#id AlicloudAuthBackendRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#id AlicloudAuthBackendRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1520,7 +1520,7 @@ namespace: str
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#namespace AlicloudAuthBackendRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#namespace AlicloudAuthBackendRole#namespace}
---
@@ -1534,7 +1534,7 @@ token_bound_cidrs: typing.List[str]
Specifies the blocks of IP addresses which are allowed to use the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_bound_cidrs AlicloudAuthBackendRole#token_bound_cidrs}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_bound_cidrs AlicloudAuthBackendRole#token_bound_cidrs}
---
@@ -1548,7 +1548,7 @@ token_explicit_max_ttl: typing.Union[int, float]
Generated Token's Explicit Maximum TTL in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_explicit_max_ttl AlicloudAuthBackendRole#token_explicit_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_explicit_max_ttl AlicloudAuthBackendRole#token_explicit_max_ttl}
---
@@ -1562,7 +1562,7 @@ token_max_ttl: typing.Union[int, float]
The maximum lifetime of the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_max_ttl AlicloudAuthBackendRole#token_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_max_ttl AlicloudAuthBackendRole#token_max_ttl}
---
@@ -1576,7 +1576,7 @@ token_no_default_policy: typing.Union[bool, IResolvable]
If true, the 'default' policy will not automatically be added to generated tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_no_default_policy AlicloudAuthBackendRole#token_no_default_policy}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_no_default_policy AlicloudAuthBackendRole#token_no_default_policy}
---
@@ -1590,7 +1590,7 @@ token_num_uses: typing.Union[int, float]
The maximum number of times a token may be used, a value of zero means unlimited.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_num_uses AlicloudAuthBackendRole#token_num_uses}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_num_uses AlicloudAuthBackendRole#token_num_uses}
---
@@ -1604,7 +1604,7 @@ token_period: typing.Union[int, float]
Generated Token's Period.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_period AlicloudAuthBackendRole#token_period}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_period AlicloudAuthBackendRole#token_period}
---
@@ -1618,7 +1618,7 @@ token_policies: typing.List[str]
Generated Token's Policies.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_policies AlicloudAuthBackendRole#token_policies}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_policies AlicloudAuthBackendRole#token_policies}
---
@@ -1632,7 +1632,7 @@ token_ttl: typing.Union[int, float]
The initial ttl of the token to generate in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_ttl AlicloudAuthBackendRole#token_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_ttl AlicloudAuthBackendRole#token_ttl}
---
@@ -1646,7 +1646,7 @@ token_type: str
The type of token to generate, service or batch.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_type AlicloudAuthBackendRole#token_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_type AlicloudAuthBackendRole#token_type}
---
diff --git a/docs/alicloudAuthBackendRole.typescript.md b/docs/alicloudAuthBackendRole.typescript.md
index 8d156945..4543c63d 100644
--- a/docs/alicloudAuthBackendRole.typescript.md
+++ b/docs/alicloudAuthBackendRole.typescript.md
@@ -4,7 +4,7 @@
### AlicloudAuthBackendRole
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role vault_alicloud_auth_backend_role}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role vault_alicloud_auth_backend_role}.
#### Initializers
@@ -551,7 +551,7 @@ The construct id used in the generated config for the AlicloudAuthBackendRole to
The id of the existing AlicloudAuthBackendRole that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#import import section} in the documentation of this resource for the id to use
---
@@ -1078,7 +1078,7 @@ const alicloudAuthBackendRoleConfig: alicloudAuthBackendRole.AlicloudAuthBackend
| arn
| string
| The role's arn. |
| role
| string
| Name of the role. Must correspond with the name of the role reflected in the arn. |
| backend
| string
| Auth backend. |
-| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#id AlicloudAuthBackendRole#id}. |
+| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#id AlicloudAuthBackendRole#id}. |
| namespace
| string
| Target namespace. (requires Enterprise). |
| tokenBoundCidrs
| string[]
| Specifies the blocks of IP addresses which are allowed to use the generated token. |
| tokenExplicitMaxTtl
| number
| Generated Token's Explicit Maximum TTL in seconds. |
@@ -1172,7 +1172,7 @@ public readonly arn: string;
The role's arn.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#arn AlicloudAuthBackendRole#arn}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#arn AlicloudAuthBackendRole#arn}
---
@@ -1186,7 +1186,7 @@ public readonly role: string;
Name of the role. Must correspond with the name of the role reflected in the arn.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#role AlicloudAuthBackendRole#role}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#role AlicloudAuthBackendRole#role}
---
@@ -1200,7 +1200,7 @@ public readonly backend: string;
Auth backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#backend AlicloudAuthBackendRole#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#backend AlicloudAuthBackendRole#backend}
---
@@ -1212,7 +1212,7 @@ public readonly id: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#id AlicloudAuthBackendRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#id AlicloudAuthBackendRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1229,7 +1229,7 @@ public readonly namespace: string;
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#namespace AlicloudAuthBackendRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#namespace AlicloudAuthBackendRole#namespace}
---
@@ -1243,7 +1243,7 @@ public readonly tokenBoundCidrs: string[];
Specifies the blocks of IP addresses which are allowed to use the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_bound_cidrs AlicloudAuthBackendRole#token_bound_cidrs}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_bound_cidrs AlicloudAuthBackendRole#token_bound_cidrs}
---
@@ -1257,7 +1257,7 @@ public readonly tokenExplicitMaxTtl: number;
Generated Token's Explicit Maximum TTL in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_explicit_max_ttl AlicloudAuthBackendRole#token_explicit_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_explicit_max_ttl AlicloudAuthBackendRole#token_explicit_max_ttl}
---
@@ -1271,7 +1271,7 @@ public readonly tokenMaxTtl: number;
The maximum lifetime of the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_max_ttl AlicloudAuthBackendRole#token_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_max_ttl AlicloudAuthBackendRole#token_max_ttl}
---
@@ -1285,7 +1285,7 @@ public readonly tokenNoDefaultPolicy: boolean | IResolvable;
If true, the 'default' policy will not automatically be added to generated tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_no_default_policy AlicloudAuthBackendRole#token_no_default_policy}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_no_default_policy AlicloudAuthBackendRole#token_no_default_policy}
---
@@ -1299,7 +1299,7 @@ public readonly tokenNumUses: number;
The maximum number of times a token may be used, a value of zero means unlimited.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_num_uses AlicloudAuthBackendRole#token_num_uses}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_num_uses AlicloudAuthBackendRole#token_num_uses}
---
@@ -1313,7 +1313,7 @@ public readonly tokenPeriod: number;
Generated Token's Period.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_period AlicloudAuthBackendRole#token_period}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_period AlicloudAuthBackendRole#token_period}
---
@@ -1327,7 +1327,7 @@ public readonly tokenPolicies: string[];
Generated Token's Policies.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_policies AlicloudAuthBackendRole#token_policies}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_policies AlicloudAuthBackendRole#token_policies}
---
@@ -1341,7 +1341,7 @@ public readonly tokenTtl: number;
The initial ttl of the token to generate in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_ttl AlicloudAuthBackendRole#token_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_ttl AlicloudAuthBackendRole#token_ttl}
---
@@ -1355,7 +1355,7 @@ public readonly tokenType: string;
The type of token to generate, service or batch.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_type AlicloudAuthBackendRole#token_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_type AlicloudAuthBackendRole#token_type}
---
diff --git a/docs/approleAuthBackendLogin.csharp.md b/docs/approleAuthBackendLogin.csharp.md
index a20c1605..4e6da52d 100644
--- a/docs/approleAuthBackendLogin.csharp.md
+++ b/docs/approleAuthBackendLogin.csharp.md
@@ -4,7 +4,7 @@
### ApproleAuthBackendLogin
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_login vault_approle_auth_backend_login}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_login vault_approle_auth_backend_login}.
#### Initializers
@@ -495,7 +495,7 @@ The construct id used in the generated config for the ApproleAuthBackendLogin to
The id of the existing ApproleAuthBackendLogin that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_login#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_login#import import section} in the documentation of this resource for the id to use
---
@@ -913,7 +913,7 @@ new ApproleAuthBackendLoginConfig {
| Provisioners
| object[]
| *No description.* |
| RoleId
| string
| The RoleID to log in with. |
| Backend
| string
| Unique name of the auth backend to configure. |
-| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_login#id ApproleAuthBackendLogin#id}. |
+| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_login#id ApproleAuthBackendLogin#id}. |
| Namespace
| string
| Target namespace. (requires Enterprise). |
| SecretId
| string
| The SecretID to log in with. |
@@ -999,7 +999,7 @@ public string RoleId { get; set; }
The RoleID to log in with.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_login#role_id ApproleAuthBackendLogin#role_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_login#role_id ApproleAuthBackendLogin#role_id}
---
@@ -1013,7 +1013,7 @@ public string Backend { get; set; }
Unique name of the auth backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_login#backend ApproleAuthBackendLogin#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_login#backend ApproleAuthBackendLogin#backend}
---
@@ -1025,7 +1025,7 @@ public string Id { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_login#id ApproleAuthBackendLogin#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_login#id ApproleAuthBackendLogin#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1042,7 +1042,7 @@ public string Namespace { get; set; }
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_login#namespace ApproleAuthBackendLogin#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_login#namespace ApproleAuthBackendLogin#namespace}
---
@@ -1056,7 +1056,7 @@ public string SecretId { get; set; }
The SecretID to log in with.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_login#secret_id ApproleAuthBackendLogin#secret_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_login#secret_id ApproleAuthBackendLogin#secret_id}
---
diff --git a/docs/approleAuthBackendLogin.go.md b/docs/approleAuthBackendLogin.go.md
index 5637dbc0..89f8e9c8 100644
--- a/docs/approleAuthBackendLogin.go.md
+++ b/docs/approleAuthBackendLogin.go.md
@@ -4,7 +4,7 @@
### ApproleAuthBackendLogin
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_login vault_approle_auth_backend_login}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_login vault_approle_auth_backend_login}.
#### Initializers
@@ -495,7 +495,7 @@ The construct id used in the generated config for the ApproleAuthBackendLogin to
The id of the existing ApproleAuthBackendLogin that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_login#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_login#import import section} in the documentation of this resource for the id to use
---
@@ -913,7 +913,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/approleauthbackendlog
| Provisioners
| *[]interface{}
| *No description.* |
| RoleId
| *string
| The RoleID to log in with. |
| Backend
| *string
| Unique name of the auth backend to configure. |
-| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_login#id ApproleAuthBackendLogin#id}. |
+| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_login#id ApproleAuthBackendLogin#id}. |
| Namespace
| *string
| Target namespace. (requires Enterprise). |
| SecretId
| *string
| The SecretID to log in with. |
@@ -999,7 +999,7 @@ RoleId *string
The RoleID to log in with.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_login#role_id ApproleAuthBackendLogin#role_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_login#role_id ApproleAuthBackendLogin#role_id}
---
@@ -1013,7 +1013,7 @@ Backend *string
Unique name of the auth backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_login#backend ApproleAuthBackendLogin#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_login#backend ApproleAuthBackendLogin#backend}
---
@@ -1025,7 +1025,7 @@ Id *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_login#id ApproleAuthBackendLogin#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_login#id ApproleAuthBackendLogin#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1042,7 +1042,7 @@ Namespace *string
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_login#namespace ApproleAuthBackendLogin#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_login#namespace ApproleAuthBackendLogin#namespace}
---
@@ -1056,7 +1056,7 @@ SecretId *string
The SecretID to log in with.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_login#secret_id ApproleAuthBackendLogin#secret_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_login#secret_id ApproleAuthBackendLogin#secret_id}
---
diff --git a/docs/approleAuthBackendLogin.java.md b/docs/approleAuthBackendLogin.java.md
index 82631d6f..ed66fa75 100644
--- a/docs/approleAuthBackendLogin.java.md
+++ b/docs/approleAuthBackendLogin.java.md
@@ -4,7 +4,7 @@
### ApproleAuthBackendLogin
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_login vault_approle_auth_backend_login}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_login vault_approle_auth_backend_login}.
#### Initializers
@@ -44,7 +44,7 @@ ApproleAuthBackendLogin.Builder.create(Construct scope, java.lang.String id)
| provisioners
| java.util.List
| *No description.* |
| roleId
| java.lang.String
| The RoleID to log in with. |
| backend
| java.lang.String
| Unique name of the auth backend to configure. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_login#id ApproleAuthBackendLogin#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_login#id ApproleAuthBackendLogin#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
| secretId
| java.lang.String
| The SecretID to log in with. |
@@ -116,7 +116,7 @@ Must be unique amongst siblings in the same scope
The RoleID to log in with.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_login#role_id ApproleAuthBackendLogin#role_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_login#role_id ApproleAuthBackendLogin#role_id}
---
@@ -126,7 +126,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Unique name of the auth backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_login#backend ApproleAuthBackendLogin#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_login#backend ApproleAuthBackendLogin#backend}
---
@@ -134,7 +134,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_login#id ApproleAuthBackendLogin#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_login#id ApproleAuthBackendLogin#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -147,7 +147,7 @@ If you experience problems setting this value it might not be settable. Please t
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_login#namespace ApproleAuthBackendLogin#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_login#namespace ApproleAuthBackendLogin#namespace}
---
@@ -157,7 +157,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The SecretID to log in with.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_login#secret_id ApproleAuthBackendLogin#secret_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_login#secret_id ApproleAuthBackendLogin#secret_id}
---
@@ -612,7 +612,7 @@ The construct id used in the generated config for the ApproleAuthBackendLogin to
The id of the existing ApproleAuthBackendLogin that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_login#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_login#import import section} in the documentation of this resource for the id to use
---
@@ -1034,7 +1034,7 @@ ApproleAuthBackendLoginConfig.builder()
| provisioners
| java.util.List
| *No description.* |
| roleId
| java.lang.String
| The RoleID to log in with. |
| backend
| java.lang.String
| Unique name of the auth backend to configure. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_login#id ApproleAuthBackendLogin#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_login#id ApproleAuthBackendLogin#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
| secretId
| java.lang.String
| The SecretID to log in with. |
@@ -1120,7 +1120,7 @@ public java.lang.String getRoleId();
The RoleID to log in with.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_login#role_id ApproleAuthBackendLogin#role_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_login#role_id ApproleAuthBackendLogin#role_id}
---
@@ -1134,7 +1134,7 @@ public java.lang.String getBackend();
Unique name of the auth backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_login#backend ApproleAuthBackendLogin#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_login#backend ApproleAuthBackendLogin#backend}
---
@@ -1146,7 +1146,7 @@ public java.lang.String getId();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_login#id ApproleAuthBackendLogin#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_login#id ApproleAuthBackendLogin#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1163,7 +1163,7 @@ public java.lang.String getNamespace();
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_login#namespace ApproleAuthBackendLogin#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_login#namespace ApproleAuthBackendLogin#namespace}
---
@@ -1177,7 +1177,7 @@ public java.lang.String getSecretId();
The SecretID to log in with.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_login#secret_id ApproleAuthBackendLogin#secret_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_login#secret_id ApproleAuthBackendLogin#secret_id}
---
diff --git a/docs/approleAuthBackendLogin.python.md b/docs/approleAuthBackendLogin.python.md
index e0d05e22..de726ab2 100644
--- a/docs/approleAuthBackendLogin.python.md
+++ b/docs/approleAuthBackendLogin.python.md
@@ -4,7 +4,7 @@
### ApproleAuthBackendLogin
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_login vault_approle_auth_backend_login}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_login vault_approle_auth_backend_login}.
#### Initializers
@@ -42,7 +42,7 @@ approleAuthBackendLogin.ApproleAuthBackendLogin(
| provisioners
| typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]]
| *No description.* |
| role_id
| str
| The RoleID to log in with. |
| backend
| str
| Unique name of the auth backend to configure. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_login#id ApproleAuthBackendLogin#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_login#id ApproleAuthBackendLogin#id}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
| secret_id
| str
| The SecretID to log in with. |
@@ -114,7 +114,7 @@ Must be unique amongst siblings in the same scope
The RoleID to log in with.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_login#role_id ApproleAuthBackendLogin#role_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_login#role_id ApproleAuthBackendLogin#role_id}
---
@@ -124,7 +124,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Unique name of the auth backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_login#backend ApproleAuthBackendLogin#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_login#backend ApproleAuthBackendLogin#backend}
---
@@ -132,7 +132,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_login#id ApproleAuthBackendLogin#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_login#id ApproleAuthBackendLogin#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -145,7 +145,7 @@ If you experience problems setting this value it might not be settable. Please t
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_login#namespace ApproleAuthBackendLogin#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_login#namespace ApproleAuthBackendLogin#namespace}
---
@@ -155,7 +155,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The SecretID to log in with.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_login#secret_id ApproleAuthBackendLogin#secret_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_login#secret_id ApproleAuthBackendLogin#secret_id}
---
@@ -656,7 +656,7 @@ The construct id used in the generated config for the ApproleAuthBackendLogin to
The id of the existing ApproleAuthBackendLogin that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_login#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_login#import import section} in the documentation of this resource for the id to use
---
@@ -1074,7 +1074,7 @@ approleAuthBackendLogin.ApproleAuthBackendLoginConfig(
| provisioners
| typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]]
| *No description.* |
| role_id
| str
| The RoleID to log in with. |
| backend
| str
| Unique name of the auth backend to configure. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_login#id ApproleAuthBackendLogin#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_login#id ApproleAuthBackendLogin#id}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
| secret_id
| str
| The SecretID to log in with. |
@@ -1160,7 +1160,7 @@ role_id: str
The RoleID to log in with.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_login#role_id ApproleAuthBackendLogin#role_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_login#role_id ApproleAuthBackendLogin#role_id}
---
@@ -1174,7 +1174,7 @@ backend: str
Unique name of the auth backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_login#backend ApproleAuthBackendLogin#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_login#backend ApproleAuthBackendLogin#backend}
---
@@ -1186,7 +1186,7 @@ id: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_login#id ApproleAuthBackendLogin#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_login#id ApproleAuthBackendLogin#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1203,7 +1203,7 @@ namespace: str
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_login#namespace ApproleAuthBackendLogin#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_login#namespace ApproleAuthBackendLogin#namespace}
---
@@ -1217,7 +1217,7 @@ secret_id: str
The SecretID to log in with.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_login#secret_id ApproleAuthBackendLogin#secret_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_login#secret_id ApproleAuthBackendLogin#secret_id}
---
diff --git a/docs/approleAuthBackendLogin.typescript.md b/docs/approleAuthBackendLogin.typescript.md
index 5ed1eded..6a4d94bb 100644
--- a/docs/approleAuthBackendLogin.typescript.md
+++ b/docs/approleAuthBackendLogin.typescript.md
@@ -4,7 +4,7 @@
### ApproleAuthBackendLogin
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_login vault_approle_auth_backend_login}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_login vault_approle_auth_backend_login}.
#### Initializers
@@ -495,7 +495,7 @@ The construct id used in the generated config for the ApproleAuthBackendLogin to
The id of the existing ApproleAuthBackendLogin that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_login#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_login#import import section} in the documentation of this resource for the id to use
---
@@ -900,7 +900,7 @@ const approleAuthBackendLoginConfig: approleAuthBackendLogin.ApproleAuthBackendL
| provisioners
| cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[]
| *No description.* |
| roleId
| string
| The RoleID to log in with. |
| backend
| string
| Unique name of the auth backend to configure. |
-| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_login#id ApproleAuthBackendLogin#id}. |
+| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_login#id ApproleAuthBackendLogin#id}. |
| namespace
| string
| Target namespace. (requires Enterprise). |
| secretId
| string
| The SecretID to log in with. |
@@ -986,7 +986,7 @@ public readonly roleId: string;
The RoleID to log in with.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_login#role_id ApproleAuthBackendLogin#role_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_login#role_id ApproleAuthBackendLogin#role_id}
---
@@ -1000,7 +1000,7 @@ public readonly backend: string;
Unique name of the auth backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_login#backend ApproleAuthBackendLogin#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_login#backend ApproleAuthBackendLogin#backend}
---
@@ -1012,7 +1012,7 @@ public readonly id: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_login#id ApproleAuthBackendLogin#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_login#id ApproleAuthBackendLogin#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1029,7 +1029,7 @@ public readonly namespace: string;
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_login#namespace ApproleAuthBackendLogin#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_login#namespace ApproleAuthBackendLogin#namespace}
---
@@ -1043,7 +1043,7 @@ public readonly secretId: string;
The SecretID to log in with.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_login#secret_id ApproleAuthBackendLogin#secret_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_login#secret_id ApproleAuthBackendLogin#secret_id}
---
diff --git a/docs/approleAuthBackendRole.csharp.md b/docs/approleAuthBackendRole.csharp.md
index 6b500ede..c0887798 100644
--- a/docs/approleAuthBackendRole.csharp.md
+++ b/docs/approleAuthBackendRole.csharp.md
@@ -4,7 +4,7 @@
### ApproleAuthBackendRole
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role vault_approle_auth_backend_role}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role vault_approle_auth_backend_role}.
#### Initializers
@@ -586,7 +586,7 @@ The construct id used in the generated config for the ApproleAuthBackendRole to
The id of the existing ApproleAuthBackendRole that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#import import section} in the documentation of this resource for the id to use
---
@@ -1227,7 +1227,7 @@ new ApproleAuthBackendRoleConfig {
| RoleName
| string
| Name of the role. |
| Backend
| string
| Unique name of the auth backend to configure. |
| BindSecretId
| object
| Whether or not to require secret_id to be present when logging in using this AppRole. |
-| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#id ApproleAuthBackendRole#id}. |
+| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#id ApproleAuthBackendRole#id}. |
| Namespace
| string
| Target namespace. (requires Enterprise). |
| RoleId
| string
| The RoleID of the role. Autogenerated if not set. |
| SecretIdBoundCidrs
| string[]
| List of CIDR blocks that can log in using the AppRole. |
@@ -1325,7 +1325,7 @@ public string RoleName { get; set; }
Name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#role_name ApproleAuthBackendRole#role_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#role_name ApproleAuthBackendRole#role_name}
---
@@ -1339,7 +1339,7 @@ public string Backend { get; set; }
Unique name of the auth backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#backend ApproleAuthBackendRole#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#backend ApproleAuthBackendRole#backend}
---
@@ -1353,7 +1353,7 @@ public object BindSecretId { get; set; }
Whether or not to require secret_id to be present when logging in using this AppRole.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#bind_secret_id ApproleAuthBackendRole#bind_secret_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#bind_secret_id ApproleAuthBackendRole#bind_secret_id}
---
@@ -1365,7 +1365,7 @@ public string Id { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#id ApproleAuthBackendRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#id ApproleAuthBackendRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1382,7 +1382,7 @@ public string Namespace { get; set; }
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#namespace ApproleAuthBackendRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#namespace ApproleAuthBackendRole#namespace}
---
@@ -1396,7 +1396,7 @@ public string RoleId { get; set; }
The RoleID of the role. Autogenerated if not set.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#role_id ApproleAuthBackendRole#role_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#role_id ApproleAuthBackendRole#role_id}
---
@@ -1410,7 +1410,7 @@ public string[] SecretIdBoundCidrs { get; set; }
List of CIDR blocks that can log in using the AppRole.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#secret_id_bound_cidrs ApproleAuthBackendRole#secret_id_bound_cidrs}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#secret_id_bound_cidrs ApproleAuthBackendRole#secret_id_bound_cidrs}
---
@@ -1426,7 +1426,7 @@ Number of times which a particular SecretID can be used to fetch a token from th
Leaving this unset or setting it to 0 will allow unlimited uses.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#secret_id_num_uses ApproleAuthBackendRole#secret_id_num_uses}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#secret_id_num_uses ApproleAuthBackendRole#secret_id_num_uses}
---
@@ -1440,7 +1440,7 @@ public double SecretIdTtl { get; set; }
Number of seconds a SecretID remains valid for.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#secret_id_ttl ApproleAuthBackendRole#secret_id_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#secret_id_ttl ApproleAuthBackendRole#secret_id_ttl}
---
@@ -1454,7 +1454,7 @@ public string[] TokenBoundCidrs { get; set; }
Specifies the blocks of IP addresses which are allowed to use the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_bound_cidrs ApproleAuthBackendRole#token_bound_cidrs}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_bound_cidrs ApproleAuthBackendRole#token_bound_cidrs}
---
@@ -1468,7 +1468,7 @@ public double TokenExplicitMaxTtl { get; set; }
Generated Token's Explicit Maximum TTL in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_explicit_max_ttl ApproleAuthBackendRole#token_explicit_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_explicit_max_ttl ApproleAuthBackendRole#token_explicit_max_ttl}
---
@@ -1482,7 +1482,7 @@ public double TokenMaxTtl { get; set; }
The maximum lifetime of the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_max_ttl ApproleAuthBackendRole#token_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_max_ttl ApproleAuthBackendRole#token_max_ttl}
---
@@ -1496,7 +1496,7 @@ public object TokenNoDefaultPolicy { get; set; }
If true, the 'default' policy will not automatically be added to generated tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_no_default_policy ApproleAuthBackendRole#token_no_default_policy}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_no_default_policy ApproleAuthBackendRole#token_no_default_policy}
---
@@ -1510,7 +1510,7 @@ public double TokenNumUses { get; set; }
The maximum number of times a token may be used, a value of zero means unlimited.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_num_uses ApproleAuthBackendRole#token_num_uses}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_num_uses ApproleAuthBackendRole#token_num_uses}
---
@@ -1524,7 +1524,7 @@ public double TokenPeriod { get; set; }
Generated Token's Period.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_period ApproleAuthBackendRole#token_period}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_period ApproleAuthBackendRole#token_period}
---
@@ -1538,7 +1538,7 @@ public string[] TokenPolicies { get; set; }
Generated Token's Policies.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_policies ApproleAuthBackendRole#token_policies}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_policies ApproleAuthBackendRole#token_policies}
---
@@ -1552,7 +1552,7 @@ public double TokenTtl { get; set; }
The initial ttl of the token to generate in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_ttl ApproleAuthBackendRole#token_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_ttl ApproleAuthBackendRole#token_ttl}
---
@@ -1566,7 +1566,7 @@ public string TokenType { get; set; }
The type of token to generate, service or batch.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_type ApproleAuthBackendRole#token_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_type ApproleAuthBackendRole#token_type}
---
diff --git a/docs/approleAuthBackendRole.go.md b/docs/approleAuthBackendRole.go.md
index 77ddb439..b05c4aa0 100644
--- a/docs/approleAuthBackendRole.go.md
+++ b/docs/approleAuthBackendRole.go.md
@@ -4,7 +4,7 @@
### ApproleAuthBackendRole
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role vault_approle_auth_backend_role}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role vault_approle_auth_backend_role}.
#### Initializers
@@ -586,7 +586,7 @@ The construct id used in the generated config for the ApproleAuthBackendRole to
The id of the existing ApproleAuthBackendRole that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#import import section} in the documentation of this resource for the id to use
---
@@ -1227,7 +1227,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/approleauthbackendrol
| RoleName
| *string
| Name of the role. |
| Backend
| *string
| Unique name of the auth backend to configure. |
| BindSecretId
| interface{}
| Whether or not to require secret_id to be present when logging in using this AppRole. |
-| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#id ApproleAuthBackendRole#id}. |
+| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#id ApproleAuthBackendRole#id}. |
| Namespace
| *string
| Target namespace. (requires Enterprise). |
| RoleId
| *string
| The RoleID of the role. Autogenerated if not set. |
| SecretIdBoundCidrs
| *[]*string
| List of CIDR blocks that can log in using the AppRole. |
@@ -1325,7 +1325,7 @@ RoleName *string
Name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#role_name ApproleAuthBackendRole#role_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#role_name ApproleAuthBackendRole#role_name}
---
@@ -1339,7 +1339,7 @@ Backend *string
Unique name of the auth backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#backend ApproleAuthBackendRole#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#backend ApproleAuthBackendRole#backend}
---
@@ -1353,7 +1353,7 @@ BindSecretId interface{}
Whether or not to require secret_id to be present when logging in using this AppRole.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#bind_secret_id ApproleAuthBackendRole#bind_secret_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#bind_secret_id ApproleAuthBackendRole#bind_secret_id}
---
@@ -1365,7 +1365,7 @@ Id *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#id ApproleAuthBackendRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#id ApproleAuthBackendRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1382,7 +1382,7 @@ Namespace *string
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#namespace ApproleAuthBackendRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#namespace ApproleAuthBackendRole#namespace}
---
@@ -1396,7 +1396,7 @@ RoleId *string
The RoleID of the role. Autogenerated if not set.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#role_id ApproleAuthBackendRole#role_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#role_id ApproleAuthBackendRole#role_id}
---
@@ -1410,7 +1410,7 @@ SecretIdBoundCidrs *[]*string
List of CIDR blocks that can log in using the AppRole.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#secret_id_bound_cidrs ApproleAuthBackendRole#secret_id_bound_cidrs}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#secret_id_bound_cidrs ApproleAuthBackendRole#secret_id_bound_cidrs}
---
@@ -1426,7 +1426,7 @@ Number of times which a particular SecretID can be used to fetch a token from th
Leaving this unset or setting it to 0 will allow unlimited uses.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#secret_id_num_uses ApproleAuthBackendRole#secret_id_num_uses}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#secret_id_num_uses ApproleAuthBackendRole#secret_id_num_uses}
---
@@ -1440,7 +1440,7 @@ SecretIdTtl *f64
Number of seconds a SecretID remains valid for.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#secret_id_ttl ApproleAuthBackendRole#secret_id_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#secret_id_ttl ApproleAuthBackendRole#secret_id_ttl}
---
@@ -1454,7 +1454,7 @@ TokenBoundCidrs *[]*string
Specifies the blocks of IP addresses which are allowed to use the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_bound_cidrs ApproleAuthBackendRole#token_bound_cidrs}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_bound_cidrs ApproleAuthBackendRole#token_bound_cidrs}
---
@@ -1468,7 +1468,7 @@ TokenExplicitMaxTtl *f64
Generated Token's Explicit Maximum TTL in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_explicit_max_ttl ApproleAuthBackendRole#token_explicit_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_explicit_max_ttl ApproleAuthBackendRole#token_explicit_max_ttl}
---
@@ -1482,7 +1482,7 @@ TokenMaxTtl *f64
The maximum lifetime of the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_max_ttl ApproleAuthBackendRole#token_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_max_ttl ApproleAuthBackendRole#token_max_ttl}
---
@@ -1496,7 +1496,7 @@ TokenNoDefaultPolicy interface{}
If true, the 'default' policy will not automatically be added to generated tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_no_default_policy ApproleAuthBackendRole#token_no_default_policy}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_no_default_policy ApproleAuthBackendRole#token_no_default_policy}
---
@@ -1510,7 +1510,7 @@ TokenNumUses *f64
The maximum number of times a token may be used, a value of zero means unlimited.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_num_uses ApproleAuthBackendRole#token_num_uses}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_num_uses ApproleAuthBackendRole#token_num_uses}
---
@@ -1524,7 +1524,7 @@ TokenPeriod *f64
Generated Token's Period.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_period ApproleAuthBackendRole#token_period}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_period ApproleAuthBackendRole#token_period}
---
@@ -1538,7 +1538,7 @@ TokenPolicies *[]*string
Generated Token's Policies.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_policies ApproleAuthBackendRole#token_policies}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_policies ApproleAuthBackendRole#token_policies}
---
@@ -1552,7 +1552,7 @@ TokenTtl *f64
The initial ttl of the token to generate in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_ttl ApproleAuthBackendRole#token_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_ttl ApproleAuthBackendRole#token_ttl}
---
@@ -1566,7 +1566,7 @@ TokenType *string
The type of token to generate, service or batch.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_type ApproleAuthBackendRole#token_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_type ApproleAuthBackendRole#token_type}
---
diff --git a/docs/approleAuthBackendRole.java.md b/docs/approleAuthBackendRole.java.md
index 2600d3f5..f08fa302 100644
--- a/docs/approleAuthBackendRole.java.md
+++ b/docs/approleAuthBackendRole.java.md
@@ -4,7 +4,7 @@
### ApproleAuthBackendRole
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role vault_approle_auth_backend_role}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role vault_approle_auth_backend_role}.
#### Initializers
@@ -60,7 +60,7 @@ ApproleAuthBackendRole.Builder.create(Construct scope, java.lang.String id)
| roleName
| java.lang.String
| Name of the role. |
| backend
| java.lang.String
| Unique name of the auth backend to configure. |
| bindSecretId
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| Whether or not to require secret_id to be present when logging in using this AppRole. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#id ApproleAuthBackendRole#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#id ApproleAuthBackendRole#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
| roleId
| java.lang.String
| The RoleID of the role. Autogenerated if not set. |
| secretIdBoundCidrs
| java.util.List
| List of CIDR blocks that can log in using the AppRole. |
@@ -144,7 +144,7 @@ Must be unique amongst siblings in the same scope
Name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#role_name ApproleAuthBackendRole#role_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#role_name ApproleAuthBackendRole#role_name}
---
@@ -154,7 +154,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Unique name of the auth backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#backend ApproleAuthBackendRole#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#backend ApproleAuthBackendRole#backend}
---
@@ -164,7 +164,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Whether or not to require secret_id to be present when logging in using this AppRole.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#bind_secret_id ApproleAuthBackendRole#bind_secret_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#bind_secret_id ApproleAuthBackendRole#bind_secret_id}
---
@@ -172,7 +172,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#id ApproleAuthBackendRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#id ApproleAuthBackendRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -185,7 +185,7 @@ If you experience problems setting this value it might not be settable. Please t
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#namespace ApproleAuthBackendRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#namespace ApproleAuthBackendRole#namespace}
---
@@ -195,7 +195,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The RoleID of the role. Autogenerated if not set.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#role_id ApproleAuthBackendRole#role_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#role_id ApproleAuthBackendRole#role_id}
---
@@ -205,7 +205,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
List of CIDR blocks that can log in using the AppRole.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#secret_id_bound_cidrs ApproleAuthBackendRole#secret_id_bound_cidrs}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#secret_id_bound_cidrs ApproleAuthBackendRole#secret_id_bound_cidrs}
---
@@ -217,7 +217,7 @@ Number of times which a particular SecretID can be used to fetch a token from th
Leaving this unset or setting it to 0 will allow unlimited uses.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#secret_id_num_uses ApproleAuthBackendRole#secret_id_num_uses}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#secret_id_num_uses ApproleAuthBackendRole#secret_id_num_uses}
---
@@ -227,7 +227,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Number of seconds a SecretID remains valid for.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#secret_id_ttl ApproleAuthBackendRole#secret_id_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#secret_id_ttl ApproleAuthBackendRole#secret_id_ttl}
---
@@ -237,7 +237,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Specifies the blocks of IP addresses which are allowed to use the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_bound_cidrs ApproleAuthBackendRole#token_bound_cidrs}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_bound_cidrs ApproleAuthBackendRole#token_bound_cidrs}
---
@@ -247,7 +247,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Generated Token's Explicit Maximum TTL in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_explicit_max_ttl ApproleAuthBackendRole#token_explicit_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_explicit_max_ttl ApproleAuthBackendRole#token_explicit_max_ttl}
---
@@ -257,7 +257,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The maximum lifetime of the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_max_ttl ApproleAuthBackendRole#token_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_max_ttl ApproleAuthBackendRole#token_max_ttl}
---
@@ -267,7 +267,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
If true, the 'default' policy will not automatically be added to generated tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_no_default_policy ApproleAuthBackendRole#token_no_default_policy}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_no_default_policy ApproleAuthBackendRole#token_no_default_policy}
---
@@ -277,7 +277,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The maximum number of times a token may be used, a value of zero means unlimited.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_num_uses ApproleAuthBackendRole#token_num_uses}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_num_uses ApproleAuthBackendRole#token_num_uses}
---
@@ -287,7 +287,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Generated Token's Period.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_period ApproleAuthBackendRole#token_period}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_period ApproleAuthBackendRole#token_period}
---
@@ -297,7 +297,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Generated Token's Policies.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_policies ApproleAuthBackendRole#token_policies}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_policies ApproleAuthBackendRole#token_policies}
---
@@ -307,7 +307,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The initial ttl of the token to generate in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_ttl ApproleAuthBackendRole#token_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_ttl ApproleAuthBackendRole#token_ttl}
---
@@ -317,7 +317,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The type of token to generate, service or batch.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_type ApproleAuthBackendRole#token_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_type ApproleAuthBackendRole#token_type}
---
@@ -863,7 +863,7 @@ The construct id used in the generated config for the ApproleAuthBackendRole to
The id of the existing ApproleAuthBackendRole that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#import import section} in the documentation of this resource for the id to use
---
@@ -1510,7 +1510,7 @@ ApproleAuthBackendRoleConfig.builder()
| roleName
| java.lang.String
| Name of the role. |
| backend
| java.lang.String
| Unique name of the auth backend to configure. |
| bindSecretId
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| Whether or not to require secret_id to be present when logging in using this AppRole. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#id ApproleAuthBackendRole#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#id ApproleAuthBackendRole#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
| roleId
| java.lang.String
| The RoleID of the role. Autogenerated if not set. |
| secretIdBoundCidrs
| java.util.List
| List of CIDR blocks that can log in using the AppRole. |
@@ -1608,7 +1608,7 @@ public java.lang.String getRoleName();
Name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#role_name ApproleAuthBackendRole#role_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#role_name ApproleAuthBackendRole#role_name}
---
@@ -1622,7 +1622,7 @@ public java.lang.String getBackend();
Unique name of the auth backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#backend ApproleAuthBackendRole#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#backend ApproleAuthBackendRole#backend}
---
@@ -1636,7 +1636,7 @@ public java.lang.Object getBindSecretId();
Whether or not to require secret_id to be present when logging in using this AppRole.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#bind_secret_id ApproleAuthBackendRole#bind_secret_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#bind_secret_id ApproleAuthBackendRole#bind_secret_id}
---
@@ -1648,7 +1648,7 @@ public java.lang.String getId();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#id ApproleAuthBackendRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#id ApproleAuthBackendRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1665,7 +1665,7 @@ public java.lang.String getNamespace();
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#namespace ApproleAuthBackendRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#namespace ApproleAuthBackendRole#namespace}
---
@@ -1679,7 +1679,7 @@ public java.lang.String getRoleId();
The RoleID of the role. Autogenerated if not set.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#role_id ApproleAuthBackendRole#role_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#role_id ApproleAuthBackendRole#role_id}
---
@@ -1693,7 +1693,7 @@ public java.util.List getSecretIdBoundCidrs();
List of CIDR blocks that can log in using the AppRole.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#secret_id_bound_cidrs ApproleAuthBackendRole#secret_id_bound_cidrs}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#secret_id_bound_cidrs ApproleAuthBackendRole#secret_id_bound_cidrs}
---
@@ -1709,7 +1709,7 @@ Number of times which a particular SecretID can be used to fetch a token from th
Leaving this unset or setting it to 0 will allow unlimited uses.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#secret_id_num_uses ApproleAuthBackendRole#secret_id_num_uses}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#secret_id_num_uses ApproleAuthBackendRole#secret_id_num_uses}
---
@@ -1723,7 +1723,7 @@ public java.lang.Number getSecretIdTtl();
Number of seconds a SecretID remains valid for.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#secret_id_ttl ApproleAuthBackendRole#secret_id_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#secret_id_ttl ApproleAuthBackendRole#secret_id_ttl}
---
@@ -1737,7 +1737,7 @@ public java.util.List getTokenBoundCidrs();
Specifies the blocks of IP addresses which are allowed to use the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_bound_cidrs ApproleAuthBackendRole#token_bound_cidrs}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_bound_cidrs ApproleAuthBackendRole#token_bound_cidrs}
---
@@ -1751,7 +1751,7 @@ public java.lang.Number getTokenExplicitMaxTtl();
Generated Token's Explicit Maximum TTL in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_explicit_max_ttl ApproleAuthBackendRole#token_explicit_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_explicit_max_ttl ApproleAuthBackendRole#token_explicit_max_ttl}
---
@@ -1765,7 +1765,7 @@ public java.lang.Number getTokenMaxTtl();
The maximum lifetime of the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_max_ttl ApproleAuthBackendRole#token_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_max_ttl ApproleAuthBackendRole#token_max_ttl}
---
@@ -1779,7 +1779,7 @@ public java.lang.Object getTokenNoDefaultPolicy();
If true, the 'default' policy will not automatically be added to generated tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_no_default_policy ApproleAuthBackendRole#token_no_default_policy}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_no_default_policy ApproleAuthBackendRole#token_no_default_policy}
---
@@ -1793,7 +1793,7 @@ public java.lang.Number getTokenNumUses();
The maximum number of times a token may be used, a value of zero means unlimited.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_num_uses ApproleAuthBackendRole#token_num_uses}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_num_uses ApproleAuthBackendRole#token_num_uses}
---
@@ -1807,7 +1807,7 @@ public java.lang.Number getTokenPeriod();
Generated Token's Period.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_period ApproleAuthBackendRole#token_period}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_period ApproleAuthBackendRole#token_period}
---
@@ -1821,7 +1821,7 @@ public java.util.List getTokenPolicies();
Generated Token's Policies.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_policies ApproleAuthBackendRole#token_policies}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_policies ApproleAuthBackendRole#token_policies}
---
@@ -1835,7 +1835,7 @@ public java.lang.Number getTokenTtl();
The initial ttl of the token to generate in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_ttl ApproleAuthBackendRole#token_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_ttl ApproleAuthBackendRole#token_ttl}
---
@@ -1849,7 +1849,7 @@ public java.lang.String getTokenType();
The type of token to generate, service or batch.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_type ApproleAuthBackendRole#token_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_type ApproleAuthBackendRole#token_type}
---
diff --git a/docs/approleAuthBackendRole.python.md b/docs/approleAuthBackendRole.python.md
index 0cc906dd..22caf8a2 100644
--- a/docs/approleAuthBackendRole.python.md
+++ b/docs/approleAuthBackendRole.python.md
@@ -4,7 +4,7 @@
### ApproleAuthBackendRole
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role vault_approle_auth_backend_role}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role vault_approle_auth_backend_role}.
#### Initializers
@@ -56,7 +56,7 @@ approleAuthBackendRole.ApproleAuthBackendRole(
| role_name
| str
| Name of the role. |
| backend
| str
| Unique name of the auth backend to configure. |
| bind_secret_id
| typing.Union[bool, cdktf.IResolvable]
| Whether or not to require secret_id to be present when logging in using this AppRole. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#id ApproleAuthBackendRole#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#id ApproleAuthBackendRole#id}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
| role_id
| str
| The RoleID of the role. Autogenerated if not set. |
| secret_id_bound_cidrs
| typing.List[str]
| List of CIDR blocks that can log in using the AppRole. |
@@ -140,7 +140,7 @@ Must be unique amongst siblings in the same scope
Name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#role_name ApproleAuthBackendRole#role_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#role_name ApproleAuthBackendRole#role_name}
---
@@ -150,7 +150,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Unique name of the auth backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#backend ApproleAuthBackendRole#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#backend ApproleAuthBackendRole#backend}
---
@@ -160,7 +160,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Whether or not to require secret_id to be present when logging in using this AppRole.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#bind_secret_id ApproleAuthBackendRole#bind_secret_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#bind_secret_id ApproleAuthBackendRole#bind_secret_id}
---
@@ -168,7 +168,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#id ApproleAuthBackendRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#id ApproleAuthBackendRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -181,7 +181,7 @@ If you experience problems setting this value it might not be settable. Please t
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#namespace ApproleAuthBackendRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#namespace ApproleAuthBackendRole#namespace}
---
@@ -191,7 +191,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The RoleID of the role. Autogenerated if not set.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#role_id ApproleAuthBackendRole#role_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#role_id ApproleAuthBackendRole#role_id}
---
@@ -201,7 +201,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
List of CIDR blocks that can log in using the AppRole.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#secret_id_bound_cidrs ApproleAuthBackendRole#secret_id_bound_cidrs}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#secret_id_bound_cidrs ApproleAuthBackendRole#secret_id_bound_cidrs}
---
@@ -213,7 +213,7 @@ Number of times which a particular SecretID can be used to fetch a token from th
Leaving this unset or setting it to 0 will allow unlimited uses.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#secret_id_num_uses ApproleAuthBackendRole#secret_id_num_uses}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#secret_id_num_uses ApproleAuthBackendRole#secret_id_num_uses}
---
@@ -223,7 +223,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Number of seconds a SecretID remains valid for.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#secret_id_ttl ApproleAuthBackendRole#secret_id_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#secret_id_ttl ApproleAuthBackendRole#secret_id_ttl}
---
@@ -233,7 +233,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Specifies the blocks of IP addresses which are allowed to use the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_bound_cidrs ApproleAuthBackendRole#token_bound_cidrs}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_bound_cidrs ApproleAuthBackendRole#token_bound_cidrs}
---
@@ -243,7 +243,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Generated Token's Explicit Maximum TTL in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_explicit_max_ttl ApproleAuthBackendRole#token_explicit_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_explicit_max_ttl ApproleAuthBackendRole#token_explicit_max_ttl}
---
@@ -253,7 +253,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The maximum lifetime of the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_max_ttl ApproleAuthBackendRole#token_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_max_ttl ApproleAuthBackendRole#token_max_ttl}
---
@@ -263,7 +263,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
If true, the 'default' policy will not automatically be added to generated tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_no_default_policy ApproleAuthBackendRole#token_no_default_policy}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_no_default_policy ApproleAuthBackendRole#token_no_default_policy}
---
@@ -273,7 +273,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The maximum number of times a token may be used, a value of zero means unlimited.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_num_uses ApproleAuthBackendRole#token_num_uses}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_num_uses ApproleAuthBackendRole#token_num_uses}
---
@@ -283,7 +283,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Generated Token's Period.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_period ApproleAuthBackendRole#token_period}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_period ApproleAuthBackendRole#token_period}
---
@@ -293,7 +293,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Generated Token's Policies.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_policies ApproleAuthBackendRole#token_policies}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_policies ApproleAuthBackendRole#token_policies}
---
@@ -303,7 +303,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The initial ttl of the token to generate in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_ttl ApproleAuthBackendRole#token_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_ttl ApproleAuthBackendRole#token_ttl}
---
@@ -313,7 +313,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The type of token to generate, service or batch.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_type ApproleAuthBackendRole#token_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_type ApproleAuthBackendRole#token_type}
---
@@ -905,7 +905,7 @@ The construct id used in the generated config for the ApproleAuthBackendRole to
The id of the existing ApproleAuthBackendRole that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#import import section} in the documentation of this resource for the id to use
---
@@ -1546,7 +1546,7 @@ approleAuthBackendRole.ApproleAuthBackendRoleConfig(
| role_name
| str
| Name of the role. |
| backend
| str
| Unique name of the auth backend to configure. |
| bind_secret_id
| typing.Union[bool, cdktf.IResolvable]
| Whether or not to require secret_id to be present when logging in using this AppRole. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#id ApproleAuthBackendRole#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#id ApproleAuthBackendRole#id}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
| role_id
| str
| The RoleID of the role. Autogenerated if not set. |
| secret_id_bound_cidrs
| typing.List[str]
| List of CIDR blocks that can log in using the AppRole. |
@@ -1644,7 +1644,7 @@ role_name: str
Name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#role_name ApproleAuthBackendRole#role_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#role_name ApproleAuthBackendRole#role_name}
---
@@ -1658,7 +1658,7 @@ backend: str
Unique name of the auth backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#backend ApproleAuthBackendRole#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#backend ApproleAuthBackendRole#backend}
---
@@ -1672,7 +1672,7 @@ bind_secret_id: typing.Union[bool, IResolvable]
Whether or not to require secret_id to be present when logging in using this AppRole.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#bind_secret_id ApproleAuthBackendRole#bind_secret_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#bind_secret_id ApproleAuthBackendRole#bind_secret_id}
---
@@ -1684,7 +1684,7 @@ id: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#id ApproleAuthBackendRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#id ApproleAuthBackendRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1701,7 +1701,7 @@ namespace: str
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#namespace ApproleAuthBackendRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#namespace ApproleAuthBackendRole#namespace}
---
@@ -1715,7 +1715,7 @@ role_id: str
The RoleID of the role. Autogenerated if not set.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#role_id ApproleAuthBackendRole#role_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#role_id ApproleAuthBackendRole#role_id}
---
@@ -1729,7 +1729,7 @@ secret_id_bound_cidrs: typing.List[str]
List of CIDR blocks that can log in using the AppRole.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#secret_id_bound_cidrs ApproleAuthBackendRole#secret_id_bound_cidrs}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#secret_id_bound_cidrs ApproleAuthBackendRole#secret_id_bound_cidrs}
---
@@ -1745,7 +1745,7 @@ Number of times which a particular SecretID can be used to fetch a token from th
Leaving this unset or setting it to 0 will allow unlimited uses.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#secret_id_num_uses ApproleAuthBackendRole#secret_id_num_uses}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#secret_id_num_uses ApproleAuthBackendRole#secret_id_num_uses}
---
@@ -1759,7 +1759,7 @@ secret_id_ttl: typing.Union[int, float]
Number of seconds a SecretID remains valid for.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#secret_id_ttl ApproleAuthBackendRole#secret_id_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#secret_id_ttl ApproleAuthBackendRole#secret_id_ttl}
---
@@ -1773,7 +1773,7 @@ token_bound_cidrs: typing.List[str]
Specifies the blocks of IP addresses which are allowed to use the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_bound_cidrs ApproleAuthBackendRole#token_bound_cidrs}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_bound_cidrs ApproleAuthBackendRole#token_bound_cidrs}
---
@@ -1787,7 +1787,7 @@ token_explicit_max_ttl: typing.Union[int, float]
Generated Token's Explicit Maximum TTL in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_explicit_max_ttl ApproleAuthBackendRole#token_explicit_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_explicit_max_ttl ApproleAuthBackendRole#token_explicit_max_ttl}
---
@@ -1801,7 +1801,7 @@ token_max_ttl: typing.Union[int, float]
The maximum lifetime of the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_max_ttl ApproleAuthBackendRole#token_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_max_ttl ApproleAuthBackendRole#token_max_ttl}
---
@@ -1815,7 +1815,7 @@ token_no_default_policy: typing.Union[bool, IResolvable]
If true, the 'default' policy will not automatically be added to generated tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_no_default_policy ApproleAuthBackendRole#token_no_default_policy}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_no_default_policy ApproleAuthBackendRole#token_no_default_policy}
---
@@ -1829,7 +1829,7 @@ token_num_uses: typing.Union[int, float]
The maximum number of times a token may be used, a value of zero means unlimited.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_num_uses ApproleAuthBackendRole#token_num_uses}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_num_uses ApproleAuthBackendRole#token_num_uses}
---
@@ -1843,7 +1843,7 @@ token_period: typing.Union[int, float]
Generated Token's Period.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_period ApproleAuthBackendRole#token_period}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_period ApproleAuthBackendRole#token_period}
---
@@ -1857,7 +1857,7 @@ token_policies: typing.List[str]
Generated Token's Policies.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_policies ApproleAuthBackendRole#token_policies}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_policies ApproleAuthBackendRole#token_policies}
---
@@ -1871,7 +1871,7 @@ token_ttl: typing.Union[int, float]
The initial ttl of the token to generate in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_ttl ApproleAuthBackendRole#token_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_ttl ApproleAuthBackendRole#token_ttl}
---
@@ -1885,7 +1885,7 @@ token_type: str
The type of token to generate, service or batch.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_type ApproleAuthBackendRole#token_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_type ApproleAuthBackendRole#token_type}
---
diff --git a/docs/approleAuthBackendRole.typescript.md b/docs/approleAuthBackendRole.typescript.md
index a7d2ac6f..f4ca9dbc 100644
--- a/docs/approleAuthBackendRole.typescript.md
+++ b/docs/approleAuthBackendRole.typescript.md
@@ -4,7 +4,7 @@
### ApproleAuthBackendRole
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role vault_approle_auth_backend_role}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role vault_approle_auth_backend_role}.
#### Initializers
@@ -586,7 +586,7 @@ The construct id used in the generated config for the ApproleAuthBackendRole to
The id of the existing ApproleAuthBackendRole that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#import import section} in the documentation of this resource for the id to use
---
@@ -1201,7 +1201,7 @@ const approleAuthBackendRoleConfig: approleAuthBackendRole.ApproleAuthBackendRol
| roleName
| string
| Name of the role. |
| backend
| string
| Unique name of the auth backend to configure. |
| bindSecretId
| boolean \| cdktf.IResolvable
| Whether or not to require secret_id to be present when logging in using this AppRole. |
-| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#id ApproleAuthBackendRole#id}. |
+| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#id ApproleAuthBackendRole#id}. |
| namespace
| string
| Target namespace. (requires Enterprise). |
| roleId
| string
| The RoleID of the role. Autogenerated if not set. |
| secretIdBoundCidrs
| string[]
| List of CIDR blocks that can log in using the AppRole. |
@@ -1299,7 +1299,7 @@ public readonly roleName: string;
Name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#role_name ApproleAuthBackendRole#role_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#role_name ApproleAuthBackendRole#role_name}
---
@@ -1313,7 +1313,7 @@ public readonly backend: string;
Unique name of the auth backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#backend ApproleAuthBackendRole#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#backend ApproleAuthBackendRole#backend}
---
@@ -1327,7 +1327,7 @@ public readonly bindSecretId: boolean | IResolvable;
Whether or not to require secret_id to be present when logging in using this AppRole.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#bind_secret_id ApproleAuthBackendRole#bind_secret_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#bind_secret_id ApproleAuthBackendRole#bind_secret_id}
---
@@ -1339,7 +1339,7 @@ public readonly id: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#id ApproleAuthBackendRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#id ApproleAuthBackendRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1356,7 +1356,7 @@ public readonly namespace: string;
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#namespace ApproleAuthBackendRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#namespace ApproleAuthBackendRole#namespace}
---
@@ -1370,7 +1370,7 @@ public readonly roleId: string;
The RoleID of the role. Autogenerated if not set.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#role_id ApproleAuthBackendRole#role_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#role_id ApproleAuthBackendRole#role_id}
---
@@ -1384,7 +1384,7 @@ public readonly secretIdBoundCidrs: string[];
List of CIDR blocks that can log in using the AppRole.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#secret_id_bound_cidrs ApproleAuthBackendRole#secret_id_bound_cidrs}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#secret_id_bound_cidrs ApproleAuthBackendRole#secret_id_bound_cidrs}
---
@@ -1400,7 +1400,7 @@ Number of times which a particular SecretID can be used to fetch a token from th
Leaving this unset or setting it to 0 will allow unlimited uses.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#secret_id_num_uses ApproleAuthBackendRole#secret_id_num_uses}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#secret_id_num_uses ApproleAuthBackendRole#secret_id_num_uses}
---
@@ -1414,7 +1414,7 @@ public readonly secretIdTtl: number;
Number of seconds a SecretID remains valid for.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#secret_id_ttl ApproleAuthBackendRole#secret_id_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#secret_id_ttl ApproleAuthBackendRole#secret_id_ttl}
---
@@ -1428,7 +1428,7 @@ public readonly tokenBoundCidrs: string[];
Specifies the blocks of IP addresses which are allowed to use the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_bound_cidrs ApproleAuthBackendRole#token_bound_cidrs}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_bound_cidrs ApproleAuthBackendRole#token_bound_cidrs}
---
@@ -1442,7 +1442,7 @@ public readonly tokenExplicitMaxTtl: number;
Generated Token's Explicit Maximum TTL in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_explicit_max_ttl ApproleAuthBackendRole#token_explicit_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_explicit_max_ttl ApproleAuthBackendRole#token_explicit_max_ttl}
---
@@ -1456,7 +1456,7 @@ public readonly tokenMaxTtl: number;
The maximum lifetime of the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_max_ttl ApproleAuthBackendRole#token_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_max_ttl ApproleAuthBackendRole#token_max_ttl}
---
@@ -1470,7 +1470,7 @@ public readonly tokenNoDefaultPolicy: boolean | IResolvable;
If true, the 'default' policy will not automatically be added to generated tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_no_default_policy ApproleAuthBackendRole#token_no_default_policy}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_no_default_policy ApproleAuthBackendRole#token_no_default_policy}
---
@@ -1484,7 +1484,7 @@ public readonly tokenNumUses: number;
The maximum number of times a token may be used, a value of zero means unlimited.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_num_uses ApproleAuthBackendRole#token_num_uses}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_num_uses ApproleAuthBackendRole#token_num_uses}
---
@@ -1498,7 +1498,7 @@ public readonly tokenPeriod: number;
Generated Token's Period.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_period ApproleAuthBackendRole#token_period}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_period ApproleAuthBackendRole#token_period}
---
@@ -1512,7 +1512,7 @@ public readonly tokenPolicies: string[];
Generated Token's Policies.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_policies ApproleAuthBackendRole#token_policies}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_policies ApproleAuthBackendRole#token_policies}
---
@@ -1526,7 +1526,7 @@ public readonly tokenTtl: number;
The initial ttl of the token to generate in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_ttl ApproleAuthBackendRole#token_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_ttl ApproleAuthBackendRole#token_ttl}
---
@@ -1540,7 +1540,7 @@ public readonly tokenType: string;
The type of token to generate, service or batch.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_type ApproleAuthBackendRole#token_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_type ApproleAuthBackendRole#token_type}
---
diff --git a/docs/approleAuthBackendRoleSecretId.csharp.md b/docs/approleAuthBackendRoleSecretId.csharp.md
index 54571247..a234dbd3 100644
--- a/docs/approleAuthBackendRoleSecretId.csharp.md
+++ b/docs/approleAuthBackendRoleSecretId.csharp.md
@@ -4,7 +4,7 @@
### ApproleAuthBackendRoleSecretId
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id vault_approle_auth_backend_role_secret_id}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id vault_approle_auth_backend_role_secret_id}.
#### Initializers
@@ -78,7 +78,9 @@ Must be unique amongst siblings in the same scope
| ResetId
| *No description.* |
| ResetMetadata
| *No description.* |
| ResetNamespace
| *No description.* |
+| ResetNumUses
| *No description.* |
| ResetSecretId
| *No description.* |
+| ResetTtl
| *No description.* |
| ResetWithWrappedAccessor
| *No description.* |
| ResetWrappingTtl
| *No description.* |
@@ -402,12 +404,24 @@ private void ResetMetadata()
private void ResetNamespace()
```
+##### `ResetNumUses`
+
+```csharp
+private void ResetNumUses()
+```
+
##### `ResetSecretId`
```csharp
private void ResetSecretId()
```
+##### `ResetTtl`
+
+```csharp
+private void ResetTtl()
+```
+
##### `ResetWithWrappedAccessor`
```csharp
@@ -523,7 +537,7 @@ The construct id used in the generated config for the ApproleAuthBackendRoleSecr
The id of the existing ApproleAuthBackendRoleSecretId that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#import import section} in the documentation of this resource for the id to use
---
@@ -561,8 +575,10 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.
| IdInput
| string
| *No description.* |
| MetadataInput
| string
| *No description.* |
| NamespaceInput
| string
| *No description.* |
+| NumUsesInput
| double
| *No description.* |
| RoleNameInput
| string
| *No description.* |
| SecretIdInput
| string
| *No description.* |
+| TtlInput
| double
| *No description.* |
| WithWrappedAccessorInput
| object
| *No description.* |
| WrappingTtlInput
| string
| *No description.* |
| Backend
| string
| *No description.* |
@@ -570,8 +586,10 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.
| Id
| string
| *No description.* |
| Metadata
| string
| *No description.* |
| Namespace
| string
| *No description.* |
+| NumUses
| double
| *No description.* |
| RoleName
| string
| *No description.* |
| SecretId
| string
| *No description.* |
+| Ttl
| double
| *No description.* |
| WithWrappedAccessor
| object
| *No description.* |
| WrappingTtl
| string
| *No description.* |
@@ -799,6 +817,16 @@ public string NamespaceInput { get; }
---
+##### `NumUsesInput`Optional
+
+```csharp
+public double NumUsesInput { get; }
+```
+
+- *Type:* double
+
+---
+
##### `RoleNameInput`Optional
```csharp
@@ -819,6 +847,16 @@ public string SecretIdInput { get; }
---
+##### `TtlInput`Optional
+
+```csharp
+public double TtlInput { get; }
+```
+
+- *Type:* double
+
+---
+
##### `WithWrappedAccessorInput`Optional
```csharp
@@ -889,6 +927,16 @@ public string Namespace { get; }
---
+##### `NumUses`Required
+
+```csharp
+public double NumUses { get; }
+```
+
+- *Type:* double
+
+---
+
##### `RoleName`Required
```csharp
@@ -909,6 +957,16 @@ public string SecretId { get; }
---
+##### `Ttl`Required
+
+```csharp
+public double Ttl { get; }
+```
+
+- *Type:* double
+
+---
+
##### `WithWrappedAccessor`Required
```csharp
@@ -970,7 +1028,9 @@ new ApproleAuthBackendRoleSecretIdConfig {
string Id = null,
string Metadata = null,
string Namespace = null,
+ double NumUses = null,
string SecretId = null,
+ double Ttl = null,
object WithWrappedAccessor = null,
string WrappingTtl = null
};
@@ -990,10 +1050,12 @@ new ApproleAuthBackendRoleSecretIdConfig {
| RoleName
| string
| Name of the role. |
| Backend
| string
| Unique name of the auth backend to configure. |
| CidrList
| string[]
| List of CIDR blocks that can log in using the SecretID. |
-| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#id ApproleAuthBackendRoleSecretId#id}. |
+| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#id ApproleAuthBackendRoleSecretId#id}. |
| Metadata
| string
| JSON-encoded secret data to write. |
| Namespace
| string
| Target namespace. (requires Enterprise). |
+| NumUses
| double
| The number of uses for the secret-id. |
| SecretId
| string
| The SecretID to be managed. If not specified, Vault auto-generates one. |
+| Ttl
| double
| The TTL duration of the SecretID. |
| WithWrappedAccessor
| object
| Use the wrapped secret-id accessor as the id of this resource. |
| WrappingTtl
| string
| The TTL duration of the wrapped SecretID. |
@@ -1079,7 +1141,7 @@ public string RoleName { get; set; }
Name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#role_name ApproleAuthBackendRoleSecretId#role_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#role_name ApproleAuthBackendRoleSecretId#role_name}
---
@@ -1093,7 +1155,7 @@ public string Backend { get; set; }
Unique name of the auth backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#backend ApproleAuthBackendRoleSecretId#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#backend ApproleAuthBackendRoleSecretId#backend}
---
@@ -1107,7 +1169,7 @@ public string[] CidrList { get; set; }
List of CIDR blocks that can log in using the SecretID.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#cidr_list ApproleAuthBackendRoleSecretId#cidr_list}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#cidr_list ApproleAuthBackendRoleSecretId#cidr_list}
---
@@ -1119,7 +1181,7 @@ public string Id { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#id ApproleAuthBackendRoleSecretId#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#id ApproleAuthBackendRoleSecretId#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1136,7 +1198,7 @@ public string Metadata { get; set; }
JSON-encoded secret data to write.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#metadata ApproleAuthBackendRoleSecretId#metadata}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#metadata ApproleAuthBackendRoleSecretId#metadata}
---
@@ -1150,7 +1212,21 @@ public string Namespace { get; set; }
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#namespace ApproleAuthBackendRoleSecretId#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#namespace ApproleAuthBackendRoleSecretId#namespace}
+
+---
+
+##### `NumUses`Optional
+
+```csharp
+public double NumUses { get; set; }
+```
+
+- *Type:* double
+
+The number of uses for the secret-id.
+
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#num_uses ApproleAuthBackendRoleSecretId#num_uses}
---
@@ -1164,7 +1240,21 @@ public string SecretId { get; set; }
The SecretID to be managed. If not specified, Vault auto-generates one.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#secret_id ApproleAuthBackendRoleSecretId#secret_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#secret_id ApproleAuthBackendRoleSecretId#secret_id}
+
+---
+
+##### `Ttl`Optional
+
+```csharp
+public double Ttl { get; set; }
+```
+
+- *Type:* double
+
+The TTL duration of the SecretID.
+
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#ttl ApproleAuthBackendRoleSecretId#ttl}
---
@@ -1180,7 +1270,7 @@ Use the wrapped secret-id accessor as the id of this resource.
If false, a fresh secret-id will be regenerated whenever the wrapping token is expired or invalidated through unwrapping.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#with_wrapped_accessor ApproleAuthBackendRoleSecretId#with_wrapped_accessor}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#with_wrapped_accessor ApproleAuthBackendRoleSecretId#with_wrapped_accessor}
---
@@ -1194,7 +1284,7 @@ public string WrappingTtl { get; set; }
The TTL duration of the wrapped SecretID.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#wrapping_ttl ApproleAuthBackendRoleSecretId#wrapping_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#wrapping_ttl ApproleAuthBackendRoleSecretId#wrapping_ttl}
---
diff --git a/docs/approleAuthBackendRoleSecretId.go.md b/docs/approleAuthBackendRoleSecretId.go.md
index 2b786e43..a282c4f9 100644
--- a/docs/approleAuthBackendRoleSecretId.go.md
+++ b/docs/approleAuthBackendRoleSecretId.go.md
@@ -4,7 +4,7 @@
### ApproleAuthBackendRoleSecretId
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id vault_approle_auth_backend_role_secret_id}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id vault_approle_auth_backend_role_secret_id}.
#### Initializers
@@ -78,7 +78,9 @@ Must be unique amongst siblings in the same scope
| ResetId
| *No description.* |
| ResetMetadata
| *No description.* |
| ResetNamespace
| *No description.* |
+| ResetNumUses
| *No description.* |
| ResetSecretId
| *No description.* |
+| ResetTtl
| *No description.* |
| ResetWithWrappedAccessor
| *No description.* |
| ResetWrappingTtl
| *No description.* |
@@ -402,12 +404,24 @@ func ResetMetadata()
func ResetNamespace()
```
+##### `ResetNumUses`
+
+```go
+func ResetNumUses()
+```
+
##### `ResetSecretId`
```go
func ResetSecretId()
```
+##### `ResetTtl`
+
+```go
+func ResetTtl()
+```
+
##### `ResetWithWrappedAccessor`
```go
@@ -523,7 +537,7 @@ The construct id used in the generated config for the ApproleAuthBackendRoleSecr
The id of the existing ApproleAuthBackendRoleSecretId that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#import import section} in the documentation of this resource for the id to use
---
@@ -561,8 +575,10 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.
| IdInput
| *string
| *No description.* |
| MetadataInput
| *string
| *No description.* |
| NamespaceInput
| *string
| *No description.* |
+| NumUsesInput
| *f64
| *No description.* |
| RoleNameInput
| *string
| *No description.* |
| SecretIdInput
| *string
| *No description.* |
+| TtlInput
| *f64
| *No description.* |
| WithWrappedAccessorInput
| interface{}
| *No description.* |
| WrappingTtlInput
| *string
| *No description.* |
| Backend
| *string
| *No description.* |
@@ -570,8 +586,10 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.
| Id
| *string
| *No description.* |
| Metadata
| *string
| *No description.* |
| Namespace
| *string
| *No description.* |
+| NumUses
| *f64
| *No description.* |
| RoleName
| *string
| *No description.* |
| SecretId
| *string
| *No description.* |
+| Ttl
| *f64
| *No description.* |
| WithWrappedAccessor
| interface{}
| *No description.* |
| WrappingTtl
| *string
| *No description.* |
@@ -799,6 +817,16 @@ func NamespaceInput() *string
---
+##### `NumUsesInput`Optional
+
+```go
+func NumUsesInput() *f64
+```
+
+- *Type:* *f64
+
+---
+
##### `RoleNameInput`Optional
```go
@@ -819,6 +847,16 @@ func SecretIdInput() *string
---
+##### `TtlInput`Optional
+
+```go
+func TtlInput() *f64
+```
+
+- *Type:* *f64
+
+---
+
##### `WithWrappedAccessorInput`Optional
```go
@@ -889,6 +927,16 @@ func Namespace() *string
---
+##### `NumUses`Required
+
+```go
+func NumUses() *f64
+```
+
+- *Type:* *f64
+
+---
+
##### `RoleName`Required
```go
@@ -909,6 +957,16 @@ func SecretId() *string
---
+##### `Ttl`Required
+
+```go
+func Ttl() *f64
+```
+
+- *Type:* *f64
+
+---
+
##### `WithWrappedAccessor`Required
```go
@@ -970,7 +1028,9 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/approleauthbackendrol
Id: *string,
Metadata: *string,
Namespace: *string,
+ NumUses: *f64,
SecretId: *string,
+ Ttl: *f64,
WithWrappedAccessor: interface{},
WrappingTtl: *string,
}
@@ -990,10 +1050,12 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/approleauthbackendrol
| RoleName
| *string
| Name of the role. |
| Backend
| *string
| Unique name of the auth backend to configure. |
| CidrList
| *[]*string
| List of CIDR blocks that can log in using the SecretID. |
-| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#id ApproleAuthBackendRoleSecretId#id}. |
+| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#id ApproleAuthBackendRoleSecretId#id}. |
| Metadata
| *string
| JSON-encoded secret data to write. |
| Namespace
| *string
| Target namespace. (requires Enterprise). |
+| NumUses
| *f64
| The number of uses for the secret-id. |
| SecretId
| *string
| The SecretID to be managed. If not specified, Vault auto-generates one. |
+| Ttl
| *f64
| The TTL duration of the SecretID. |
| WithWrappedAccessor
| interface{}
| Use the wrapped secret-id accessor as the id of this resource. |
| WrappingTtl
| *string
| The TTL duration of the wrapped SecretID. |
@@ -1079,7 +1141,7 @@ RoleName *string
Name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#role_name ApproleAuthBackendRoleSecretId#role_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#role_name ApproleAuthBackendRoleSecretId#role_name}
---
@@ -1093,7 +1155,7 @@ Backend *string
Unique name of the auth backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#backend ApproleAuthBackendRoleSecretId#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#backend ApproleAuthBackendRoleSecretId#backend}
---
@@ -1107,7 +1169,7 @@ CidrList *[]*string
List of CIDR blocks that can log in using the SecretID.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#cidr_list ApproleAuthBackendRoleSecretId#cidr_list}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#cidr_list ApproleAuthBackendRoleSecretId#cidr_list}
---
@@ -1119,7 +1181,7 @@ Id *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#id ApproleAuthBackendRoleSecretId#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#id ApproleAuthBackendRoleSecretId#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1136,7 +1198,7 @@ Metadata *string
JSON-encoded secret data to write.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#metadata ApproleAuthBackendRoleSecretId#metadata}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#metadata ApproleAuthBackendRoleSecretId#metadata}
---
@@ -1150,7 +1212,21 @@ Namespace *string
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#namespace ApproleAuthBackendRoleSecretId#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#namespace ApproleAuthBackendRoleSecretId#namespace}
+
+---
+
+##### `NumUses`Optional
+
+```go
+NumUses *f64
+```
+
+- *Type:* *f64
+
+The number of uses for the secret-id.
+
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#num_uses ApproleAuthBackendRoleSecretId#num_uses}
---
@@ -1164,7 +1240,21 @@ SecretId *string
The SecretID to be managed. If not specified, Vault auto-generates one.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#secret_id ApproleAuthBackendRoleSecretId#secret_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#secret_id ApproleAuthBackendRoleSecretId#secret_id}
+
+---
+
+##### `Ttl`Optional
+
+```go
+Ttl *f64
+```
+
+- *Type:* *f64
+
+The TTL duration of the SecretID.
+
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#ttl ApproleAuthBackendRoleSecretId#ttl}
---
@@ -1180,7 +1270,7 @@ Use the wrapped secret-id accessor as the id of this resource.
If false, a fresh secret-id will be regenerated whenever the wrapping token is expired or invalidated through unwrapping.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#with_wrapped_accessor ApproleAuthBackendRoleSecretId#with_wrapped_accessor}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#with_wrapped_accessor ApproleAuthBackendRoleSecretId#with_wrapped_accessor}
---
@@ -1194,7 +1284,7 @@ WrappingTtl *string
The TTL duration of the wrapped SecretID.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#wrapping_ttl ApproleAuthBackendRoleSecretId#wrapping_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#wrapping_ttl ApproleAuthBackendRoleSecretId#wrapping_ttl}
---
diff --git a/docs/approleAuthBackendRoleSecretId.java.md b/docs/approleAuthBackendRoleSecretId.java.md
index 98ca5e1c..a7867b46 100644
--- a/docs/approleAuthBackendRoleSecretId.java.md
+++ b/docs/approleAuthBackendRoleSecretId.java.md
@@ -4,7 +4,7 @@
### ApproleAuthBackendRoleSecretId
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id vault_approle_auth_backend_role_secret_id}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id vault_approle_auth_backend_role_secret_id}.
#### Initializers
@@ -29,7 +29,9 @@ ApproleAuthBackendRoleSecretId.Builder.create(Construct scope, java.lang.String
// .id(java.lang.String)
// .metadata(java.lang.String)
// .namespace(java.lang.String)
+// .numUses(java.lang.Number)
// .secretId(java.lang.String)
+// .ttl(java.lang.Number)
// .withWrappedAccessor(java.lang.Boolean)
// .withWrappedAccessor(IResolvable)
// .wrappingTtl(java.lang.String)
@@ -50,10 +52,12 @@ ApproleAuthBackendRoleSecretId.Builder.create(Construct scope, java.lang.String
| roleName
| java.lang.String
| Name of the role. |
| backend
| java.lang.String
| Unique name of the auth backend to configure. |
| cidrList
| java.util.List
| List of CIDR blocks that can log in using the SecretID. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#id ApproleAuthBackendRoleSecretId#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#id ApproleAuthBackendRoleSecretId#id}. |
| metadata
| java.lang.String
| JSON-encoded secret data to write. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
+| numUses
| java.lang.Number
| The number of uses for the secret-id. |
| secretId
| java.lang.String
| The SecretID to be managed. If not specified, Vault auto-generates one. |
+| ttl
| java.lang.Number
| The TTL duration of the SecretID. |
| withWrappedAccessor
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| Use the wrapped secret-id accessor as the id of this resource. |
| wrappingTtl
| java.lang.String
| The TTL duration of the wrapped SecretID. |
@@ -125,7 +129,7 @@ Must be unique amongst siblings in the same scope
Name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#role_name ApproleAuthBackendRoleSecretId#role_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#role_name ApproleAuthBackendRoleSecretId#role_name}
---
@@ -135,7 +139,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Unique name of the auth backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#backend ApproleAuthBackendRoleSecretId#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#backend ApproleAuthBackendRoleSecretId#backend}
---
@@ -145,7 +149,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
List of CIDR blocks that can log in using the SecretID.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#cidr_list ApproleAuthBackendRoleSecretId#cidr_list}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#cidr_list ApproleAuthBackendRoleSecretId#cidr_list}
---
@@ -153,7 +157,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#id ApproleAuthBackendRoleSecretId#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#id ApproleAuthBackendRoleSecretId#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -166,7 +170,7 @@ If you experience problems setting this value it might not be settable. Please t
JSON-encoded secret data to write.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#metadata ApproleAuthBackendRoleSecretId#metadata}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#metadata ApproleAuthBackendRoleSecretId#metadata}
---
@@ -176,7 +180,17 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#namespace ApproleAuthBackendRoleSecretId#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#namespace ApproleAuthBackendRoleSecretId#namespace}
+
+---
+
+##### `numUses`Optional
+
+- *Type:* java.lang.Number
+
+The number of uses for the secret-id.
+
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#num_uses ApproleAuthBackendRoleSecretId#num_uses}
---
@@ -186,7 +200,17 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The SecretID to be managed. If not specified, Vault auto-generates one.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#secret_id ApproleAuthBackendRoleSecretId#secret_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#secret_id ApproleAuthBackendRoleSecretId#secret_id}
+
+---
+
+##### `ttl`Optional
+
+- *Type:* java.lang.Number
+
+The TTL duration of the SecretID.
+
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#ttl ApproleAuthBackendRoleSecretId#ttl}
---
@@ -198,7 +222,7 @@ Use the wrapped secret-id accessor as the id of this resource.
If false, a fresh secret-id will be regenerated whenever the wrapping token is expired or invalidated through unwrapping.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#with_wrapped_accessor ApproleAuthBackendRoleSecretId#with_wrapped_accessor}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#with_wrapped_accessor ApproleAuthBackendRoleSecretId#with_wrapped_accessor}
---
@@ -208,7 +232,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The TTL duration of the wrapped SecretID.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#wrapping_ttl ApproleAuthBackendRoleSecretId#wrapping_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#wrapping_ttl ApproleAuthBackendRoleSecretId#wrapping_ttl}
---
@@ -244,7 +268,9 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
| resetId
| *No description.* |
| resetMetadata
| *No description.* |
| resetNamespace
| *No description.* |
+| resetNumUses
| *No description.* |
| resetSecretId
| *No description.* |
+| resetTtl
| *No description.* |
| resetWithWrappedAccessor
| *No description.* |
| resetWrappingTtl
| *No description.* |
@@ -570,12 +596,24 @@ public void resetMetadata()
public void resetNamespace()
```
+##### `resetNumUses`
+
+```java
+public void resetNumUses()
+```
+
##### `resetSecretId`
```java
public void resetSecretId()
```
+##### `resetTtl`
+
+```java
+public void resetTtl()
+```
+
##### `resetWithWrappedAccessor`
```java
@@ -691,7 +729,7 @@ The construct id used in the generated config for the ApproleAuthBackendRoleSecr
The id of the existing ApproleAuthBackendRoleSecretId that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#import import section} in the documentation of this resource for the id to use
---
@@ -729,8 +767,10 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.
| idInput
| java.lang.String
| *No description.* |
| metadataInput
| java.lang.String
| *No description.* |
| namespaceInput
| java.lang.String
| *No description.* |
+| numUsesInput
| java.lang.Number
| *No description.* |
| roleNameInput
| java.lang.String
| *No description.* |
| secretIdInput
| java.lang.String
| *No description.* |
+| ttlInput
| java.lang.Number
| *No description.* |
| withWrappedAccessorInput
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| *No description.* |
| wrappingTtlInput
| java.lang.String
| *No description.* |
| backend
| java.lang.String
| *No description.* |
@@ -738,8 +778,10 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.
| id
| java.lang.String
| *No description.* |
| metadata
| java.lang.String
| *No description.* |
| namespace
| java.lang.String
| *No description.* |
+| numUses
| java.lang.Number
| *No description.* |
| roleName
| java.lang.String
| *No description.* |
| secretId
| java.lang.String
| *No description.* |
+| ttl
| java.lang.Number
| *No description.* |
| withWrappedAccessor
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| *No description.* |
| wrappingTtl
| java.lang.String
| *No description.* |
@@ -967,6 +1009,16 @@ public java.lang.String getNamespaceInput();
---
+##### `numUsesInput`Optional
+
+```java
+public java.lang.Number getNumUsesInput();
+```
+
+- *Type:* java.lang.Number
+
+---
+
##### `roleNameInput`Optional
```java
@@ -987,6 +1039,16 @@ public java.lang.String getSecretIdInput();
---
+##### `ttlInput`Optional
+
+```java
+public java.lang.Number getTtlInput();
+```
+
+- *Type:* java.lang.Number
+
+---
+
##### `withWrappedAccessorInput`Optional
```java
@@ -1057,6 +1119,16 @@ public java.lang.String getNamespace();
---
+##### `numUses`Required
+
+```java
+public java.lang.Number getNumUses();
+```
+
+- *Type:* java.lang.Number
+
+---
+
##### `roleName`Required
```java
@@ -1077,6 +1149,16 @@ public java.lang.String getSecretId();
---
+##### `ttl`Required
+
+```java
+public java.lang.Number getTtl();
+```
+
+- *Type:* java.lang.Number
+
+---
+
##### `withWrappedAccessor`Required
```java
@@ -1142,7 +1224,9 @@ ApproleAuthBackendRoleSecretIdConfig.builder()
// .id(java.lang.String)
// .metadata(java.lang.String)
// .namespace(java.lang.String)
+// .numUses(java.lang.Number)
// .secretId(java.lang.String)
+// .ttl(java.lang.Number)
// .withWrappedAccessor(java.lang.Boolean)
// .withWrappedAccessor(IResolvable)
// .wrappingTtl(java.lang.String)
@@ -1163,10 +1247,12 @@ ApproleAuthBackendRoleSecretIdConfig.builder()
| roleName
| java.lang.String
| Name of the role. |
| backend
| java.lang.String
| Unique name of the auth backend to configure. |
| cidrList
| java.util.List
| List of CIDR blocks that can log in using the SecretID. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#id ApproleAuthBackendRoleSecretId#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#id ApproleAuthBackendRoleSecretId#id}. |
| metadata
| java.lang.String
| JSON-encoded secret data to write. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
+| numUses
| java.lang.Number
| The number of uses for the secret-id. |
| secretId
| java.lang.String
| The SecretID to be managed. If not specified, Vault auto-generates one. |
+| ttl
| java.lang.Number
| The TTL duration of the SecretID. |
| withWrappedAccessor
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| Use the wrapped secret-id accessor as the id of this resource. |
| wrappingTtl
| java.lang.String
| The TTL duration of the wrapped SecretID. |
@@ -1252,7 +1338,7 @@ public java.lang.String getRoleName();
Name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#role_name ApproleAuthBackendRoleSecretId#role_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#role_name ApproleAuthBackendRoleSecretId#role_name}
---
@@ -1266,7 +1352,7 @@ public java.lang.String getBackend();
Unique name of the auth backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#backend ApproleAuthBackendRoleSecretId#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#backend ApproleAuthBackendRoleSecretId#backend}
---
@@ -1280,7 +1366,7 @@ public java.util.List getCidrList();
List of CIDR blocks that can log in using the SecretID.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#cidr_list ApproleAuthBackendRoleSecretId#cidr_list}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#cidr_list ApproleAuthBackendRoleSecretId#cidr_list}
---
@@ -1292,7 +1378,7 @@ public java.lang.String getId();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#id ApproleAuthBackendRoleSecretId#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#id ApproleAuthBackendRoleSecretId#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1309,7 +1395,7 @@ public java.lang.String getMetadata();
JSON-encoded secret data to write.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#metadata ApproleAuthBackendRoleSecretId#metadata}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#metadata ApproleAuthBackendRoleSecretId#metadata}
---
@@ -1323,7 +1409,21 @@ public java.lang.String getNamespace();
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#namespace ApproleAuthBackendRoleSecretId#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#namespace ApproleAuthBackendRoleSecretId#namespace}
+
+---
+
+##### `numUses`Optional
+
+```java
+public java.lang.Number getNumUses();
+```
+
+- *Type:* java.lang.Number
+
+The number of uses for the secret-id.
+
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#num_uses ApproleAuthBackendRoleSecretId#num_uses}
---
@@ -1337,7 +1437,21 @@ public java.lang.String getSecretId();
The SecretID to be managed. If not specified, Vault auto-generates one.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#secret_id ApproleAuthBackendRoleSecretId#secret_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#secret_id ApproleAuthBackendRoleSecretId#secret_id}
+
+---
+
+##### `ttl`Optional
+
+```java
+public java.lang.Number getTtl();
+```
+
+- *Type:* java.lang.Number
+
+The TTL duration of the SecretID.
+
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#ttl ApproleAuthBackendRoleSecretId#ttl}
---
@@ -1353,7 +1467,7 @@ Use the wrapped secret-id accessor as the id of this resource.
If false, a fresh secret-id will be regenerated whenever the wrapping token is expired or invalidated through unwrapping.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#with_wrapped_accessor ApproleAuthBackendRoleSecretId#with_wrapped_accessor}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#with_wrapped_accessor ApproleAuthBackendRoleSecretId#with_wrapped_accessor}
---
@@ -1367,7 +1481,7 @@ public java.lang.String getWrappingTtl();
The TTL duration of the wrapped SecretID.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#wrapping_ttl ApproleAuthBackendRoleSecretId#wrapping_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#wrapping_ttl ApproleAuthBackendRoleSecretId#wrapping_ttl}
---
diff --git a/docs/approleAuthBackendRoleSecretId.python.md b/docs/approleAuthBackendRoleSecretId.python.md
index 268d6a66..5d768afb 100644
--- a/docs/approleAuthBackendRoleSecretId.python.md
+++ b/docs/approleAuthBackendRoleSecretId.python.md
@@ -4,7 +4,7 @@
### ApproleAuthBackendRoleSecretId
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id vault_approle_auth_backend_role_secret_id}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id vault_approle_auth_backend_role_secret_id}.
#### Initializers
@@ -27,7 +27,9 @@ approleAuthBackendRoleSecretId.ApproleAuthBackendRoleSecretId(
id: str = None,
metadata: str = None,
namespace: str = None,
+ num_uses: typing.Union[int, float] = None,
secret_id: str = None,
+ ttl: typing.Union[int, float] = None,
with_wrapped_accessor: typing.Union[bool, IResolvable] = None,
wrapping_ttl: str = None
)
@@ -47,10 +49,12 @@ approleAuthBackendRoleSecretId.ApproleAuthBackendRoleSecretId(
| role_name
| str
| Name of the role. |
| backend
| str
| Unique name of the auth backend to configure. |
| cidr_list
| typing.List[str]
| List of CIDR blocks that can log in using the SecretID. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#id ApproleAuthBackendRoleSecretId#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#id ApproleAuthBackendRoleSecretId#id}. |
| metadata
| str
| JSON-encoded secret data to write. |
| namespace
| str
| Target namespace. (requires Enterprise). |
+| num_uses
| typing.Union[int, float]
| The number of uses for the secret-id. |
| secret_id
| str
| The SecretID to be managed. If not specified, Vault auto-generates one. |
+| ttl
| typing.Union[int, float]
| The TTL duration of the SecretID. |
| with_wrapped_accessor
| typing.Union[bool, cdktf.IResolvable]
| Use the wrapped secret-id accessor as the id of this resource. |
| wrapping_ttl
| str
| The TTL duration of the wrapped SecretID. |
@@ -122,7 +126,7 @@ Must be unique amongst siblings in the same scope
Name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#role_name ApproleAuthBackendRoleSecretId#role_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#role_name ApproleAuthBackendRoleSecretId#role_name}
---
@@ -132,7 +136,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Unique name of the auth backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#backend ApproleAuthBackendRoleSecretId#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#backend ApproleAuthBackendRoleSecretId#backend}
---
@@ -142,7 +146,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
List of CIDR blocks that can log in using the SecretID.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#cidr_list ApproleAuthBackendRoleSecretId#cidr_list}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#cidr_list ApproleAuthBackendRoleSecretId#cidr_list}
---
@@ -150,7 +154,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#id ApproleAuthBackendRoleSecretId#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#id ApproleAuthBackendRoleSecretId#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -163,7 +167,7 @@ If you experience problems setting this value it might not be settable. Please t
JSON-encoded secret data to write.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#metadata ApproleAuthBackendRoleSecretId#metadata}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#metadata ApproleAuthBackendRoleSecretId#metadata}
---
@@ -173,7 +177,17 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#namespace ApproleAuthBackendRoleSecretId#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#namespace ApproleAuthBackendRoleSecretId#namespace}
+
+---
+
+##### `num_uses`Optional
+
+- *Type:* typing.Union[int, float]
+
+The number of uses for the secret-id.
+
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#num_uses ApproleAuthBackendRoleSecretId#num_uses}
---
@@ -183,7 +197,17 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The SecretID to be managed. If not specified, Vault auto-generates one.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#secret_id ApproleAuthBackendRoleSecretId#secret_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#secret_id ApproleAuthBackendRoleSecretId#secret_id}
+
+---
+
+##### `ttl`Optional
+
+- *Type:* typing.Union[int, float]
+
+The TTL duration of the SecretID.
+
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#ttl ApproleAuthBackendRoleSecretId#ttl}
---
@@ -195,7 +219,7 @@ Use the wrapped secret-id accessor as the id of this resource.
If false, a fresh secret-id will be regenerated whenever the wrapping token is expired or invalidated through unwrapping.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#with_wrapped_accessor ApproleAuthBackendRoleSecretId#with_wrapped_accessor}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#with_wrapped_accessor ApproleAuthBackendRoleSecretId#with_wrapped_accessor}
---
@@ -205,7 +229,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The TTL duration of the wrapped SecretID.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#wrapping_ttl ApproleAuthBackendRoleSecretId#wrapping_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#wrapping_ttl ApproleAuthBackendRoleSecretId#wrapping_ttl}
---
@@ -241,7 +265,9 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
| reset_id
| *No description.* |
| reset_metadata
| *No description.* |
| reset_namespace
| *No description.* |
+| reset_num_uses
| *No description.* |
| reset_secret_id
| *No description.* |
+| reset_ttl
| *No description.* |
| reset_with_wrapped_accessor
| *No description.* |
| reset_wrapping_ttl
| *No description.* |
@@ -602,12 +628,24 @@ def reset_metadata() -> None
def reset_namespace() -> None
```
+##### `reset_num_uses`
+
+```python
+def reset_num_uses() -> None
+```
+
##### `reset_secret_id`
```python
def reset_secret_id() -> None
```
+##### `reset_ttl`
+
+```python
+def reset_ttl() -> None
+```
+
##### `reset_with_wrapped_accessor`
```python
@@ -734,7 +772,7 @@ The construct id used in the generated config for the ApproleAuthBackendRoleSecr
The id of the existing ApproleAuthBackendRoleSecretId that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#import import section} in the documentation of this resource for the id to use
---
@@ -772,8 +810,10 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.
| id_input
| str
| *No description.* |
| metadata_input
| str
| *No description.* |
| namespace_input
| str
| *No description.* |
+| num_uses_input
| typing.Union[int, float]
| *No description.* |
| role_name_input
| str
| *No description.* |
| secret_id_input
| str
| *No description.* |
+| ttl_input
| typing.Union[int, float]
| *No description.* |
| with_wrapped_accessor_input
| typing.Union[bool, cdktf.IResolvable]
| *No description.* |
| wrapping_ttl_input
| str
| *No description.* |
| backend
| str
| *No description.* |
@@ -781,8 +821,10 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.
| id
| str
| *No description.* |
| metadata
| str
| *No description.* |
| namespace
| str
| *No description.* |
+| num_uses
| typing.Union[int, float]
| *No description.* |
| role_name
| str
| *No description.* |
| secret_id
| str
| *No description.* |
+| ttl
| typing.Union[int, float]
| *No description.* |
| with_wrapped_accessor
| typing.Union[bool, cdktf.IResolvable]
| *No description.* |
| wrapping_ttl
| str
| *No description.* |
@@ -1010,6 +1052,16 @@ namespace_input: str
---
+##### `num_uses_input`Optional
+
+```python
+num_uses_input: typing.Union[int, float]
+```
+
+- *Type:* typing.Union[int, float]
+
+---
+
##### `role_name_input`Optional
```python
@@ -1030,6 +1082,16 @@ secret_id_input: str
---
+##### `ttl_input`Optional
+
+```python
+ttl_input: typing.Union[int, float]
+```
+
+- *Type:* typing.Union[int, float]
+
+---
+
##### `with_wrapped_accessor_input`Optional
```python
@@ -1100,6 +1162,16 @@ namespace: str
---
+##### `num_uses`Required
+
+```python
+num_uses: typing.Union[int, float]
+```
+
+- *Type:* typing.Union[int, float]
+
+---
+
##### `role_name`Required
```python
@@ -1120,6 +1192,16 @@ secret_id: str
---
+##### `ttl`Required
+
+```python
+ttl: typing.Union[int, float]
+```
+
+- *Type:* typing.Union[int, float]
+
+---
+
##### `with_wrapped_accessor`Required
```python
@@ -1181,7 +1263,9 @@ approleAuthBackendRoleSecretId.ApproleAuthBackendRoleSecretIdConfig(
id: str = None,
metadata: str = None,
namespace: str = None,
+ num_uses: typing.Union[int, float] = None,
secret_id: str = None,
+ ttl: typing.Union[int, float] = None,
with_wrapped_accessor: typing.Union[bool, IResolvable] = None,
wrapping_ttl: str = None
)
@@ -1201,10 +1285,12 @@ approleAuthBackendRoleSecretId.ApproleAuthBackendRoleSecretIdConfig(
| role_name
| str
| Name of the role. |
| backend
| str
| Unique name of the auth backend to configure. |
| cidr_list
| typing.List[str]
| List of CIDR blocks that can log in using the SecretID. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#id ApproleAuthBackendRoleSecretId#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#id ApproleAuthBackendRoleSecretId#id}. |
| metadata
| str
| JSON-encoded secret data to write. |
| namespace
| str
| Target namespace. (requires Enterprise). |
+| num_uses
| typing.Union[int, float]
| The number of uses for the secret-id. |
| secret_id
| str
| The SecretID to be managed. If not specified, Vault auto-generates one. |
+| ttl
| typing.Union[int, float]
| The TTL duration of the SecretID. |
| with_wrapped_accessor
| typing.Union[bool, cdktf.IResolvable]
| Use the wrapped secret-id accessor as the id of this resource. |
| wrapping_ttl
| str
| The TTL duration of the wrapped SecretID. |
@@ -1290,7 +1376,7 @@ role_name: str
Name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#role_name ApproleAuthBackendRoleSecretId#role_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#role_name ApproleAuthBackendRoleSecretId#role_name}
---
@@ -1304,7 +1390,7 @@ backend: str
Unique name of the auth backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#backend ApproleAuthBackendRoleSecretId#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#backend ApproleAuthBackendRoleSecretId#backend}
---
@@ -1318,7 +1404,7 @@ cidr_list: typing.List[str]
List of CIDR blocks that can log in using the SecretID.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#cidr_list ApproleAuthBackendRoleSecretId#cidr_list}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#cidr_list ApproleAuthBackendRoleSecretId#cidr_list}
---
@@ -1330,7 +1416,7 @@ id: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#id ApproleAuthBackendRoleSecretId#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#id ApproleAuthBackendRoleSecretId#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1347,7 +1433,7 @@ metadata: str
JSON-encoded secret data to write.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#metadata ApproleAuthBackendRoleSecretId#metadata}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#metadata ApproleAuthBackendRoleSecretId#metadata}
---
@@ -1361,7 +1447,21 @@ namespace: str
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#namespace ApproleAuthBackendRoleSecretId#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#namespace ApproleAuthBackendRoleSecretId#namespace}
+
+---
+
+##### `num_uses`Optional
+
+```python
+num_uses: typing.Union[int, float]
+```
+
+- *Type:* typing.Union[int, float]
+
+The number of uses for the secret-id.
+
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#num_uses ApproleAuthBackendRoleSecretId#num_uses}
---
@@ -1375,7 +1475,21 @@ secret_id: str
The SecretID to be managed. If not specified, Vault auto-generates one.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#secret_id ApproleAuthBackendRoleSecretId#secret_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#secret_id ApproleAuthBackendRoleSecretId#secret_id}
+
+---
+
+##### `ttl`Optional
+
+```python
+ttl: typing.Union[int, float]
+```
+
+- *Type:* typing.Union[int, float]
+
+The TTL duration of the SecretID.
+
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#ttl ApproleAuthBackendRoleSecretId#ttl}
---
@@ -1391,7 +1505,7 @@ Use the wrapped secret-id accessor as the id of this resource.
If false, a fresh secret-id will be regenerated whenever the wrapping token is expired or invalidated through unwrapping.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#with_wrapped_accessor ApproleAuthBackendRoleSecretId#with_wrapped_accessor}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#with_wrapped_accessor ApproleAuthBackendRoleSecretId#with_wrapped_accessor}
---
@@ -1405,7 +1519,7 @@ wrapping_ttl: str
The TTL duration of the wrapped SecretID.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#wrapping_ttl ApproleAuthBackendRoleSecretId#wrapping_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#wrapping_ttl ApproleAuthBackendRoleSecretId#wrapping_ttl}
---
diff --git a/docs/approleAuthBackendRoleSecretId.typescript.md b/docs/approleAuthBackendRoleSecretId.typescript.md
index a9000138..ead9a011 100644
--- a/docs/approleAuthBackendRoleSecretId.typescript.md
+++ b/docs/approleAuthBackendRoleSecretId.typescript.md
@@ -4,7 +4,7 @@
### ApproleAuthBackendRoleSecretId
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id vault_approle_auth_backend_role_secret_id}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id vault_approle_auth_backend_role_secret_id}.
#### Initializers
@@ -78,7 +78,9 @@ Must be unique amongst siblings in the same scope
| resetId
| *No description.* |
| resetMetadata
| *No description.* |
| resetNamespace
| *No description.* |
+| resetNumUses
| *No description.* |
| resetSecretId
| *No description.* |
+| resetTtl
| *No description.* |
| resetWithWrappedAccessor
| *No description.* |
| resetWrappingTtl
| *No description.* |
@@ -402,12 +404,24 @@ public resetMetadata(): void
public resetNamespace(): void
```
+##### `resetNumUses`
+
+```typescript
+public resetNumUses(): void
+```
+
##### `resetSecretId`
```typescript
public resetSecretId(): void
```
+##### `resetTtl`
+
+```typescript
+public resetTtl(): void
+```
+
##### `resetWithWrappedAccessor`
```typescript
@@ -523,7 +537,7 @@ The construct id used in the generated config for the ApproleAuthBackendRoleSecr
The id of the existing ApproleAuthBackendRoleSecretId that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#import import section} in the documentation of this resource for the id to use
---
@@ -561,8 +575,10 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.
| idInput
| string
| *No description.* |
| metadataInput
| string
| *No description.* |
| namespaceInput
| string
| *No description.* |
+| numUsesInput
| number
| *No description.* |
| roleNameInput
| string
| *No description.* |
| secretIdInput
| string
| *No description.* |
+| ttlInput
| number
| *No description.* |
| withWrappedAccessorInput
| boolean \| cdktf.IResolvable
| *No description.* |
| wrappingTtlInput
| string
| *No description.* |
| backend
| string
| *No description.* |
@@ -570,8 +586,10 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.
| id
| string
| *No description.* |
| metadata
| string
| *No description.* |
| namespace
| string
| *No description.* |
+| numUses
| number
| *No description.* |
| roleName
| string
| *No description.* |
| secretId
| string
| *No description.* |
+| ttl
| number
| *No description.* |
| withWrappedAccessor
| boolean \| cdktf.IResolvable
| *No description.* |
| wrappingTtl
| string
| *No description.* |
@@ -799,6 +817,16 @@ public readonly namespaceInput: string;
---
+##### `numUsesInput`Optional
+
+```typescript
+public readonly numUsesInput: number;
+```
+
+- *Type:* number
+
+---
+
##### `roleNameInput`Optional
```typescript
@@ -819,6 +847,16 @@ public readonly secretIdInput: string;
---
+##### `ttlInput`Optional
+
+```typescript
+public readonly ttlInput: number;
+```
+
+- *Type:* number
+
+---
+
##### `withWrappedAccessorInput`Optional
```typescript
@@ -889,6 +927,16 @@ public readonly namespace: string;
---
+##### `numUses`Required
+
+```typescript
+public readonly numUses: number;
+```
+
+- *Type:* number
+
+---
+
##### `roleName`Required
```typescript
@@ -909,6 +957,16 @@ public readonly secretId: string;
---
+##### `ttl`Required
+
+```typescript
+public readonly ttl: number;
+```
+
+- *Type:* number
+
+---
+
##### `withWrappedAccessor`Required
```typescript
@@ -973,10 +1031,12 @@ const approleAuthBackendRoleSecretIdConfig: approleAuthBackendRoleSecretId.Appro
| roleName
| string
| Name of the role. |
| backend
| string
| Unique name of the auth backend to configure. |
| cidrList
| string[]
| List of CIDR blocks that can log in using the SecretID. |
-| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#id ApproleAuthBackendRoleSecretId#id}. |
+| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#id ApproleAuthBackendRoleSecretId#id}. |
| metadata
| string
| JSON-encoded secret data to write. |
| namespace
| string
| Target namespace. (requires Enterprise). |
+| numUses
| number
| The number of uses for the secret-id. |
| secretId
| string
| The SecretID to be managed. If not specified, Vault auto-generates one. |
+| ttl
| number
| The TTL duration of the SecretID. |
| withWrappedAccessor
| boolean \| cdktf.IResolvable
| Use the wrapped secret-id accessor as the id of this resource. |
| wrappingTtl
| string
| The TTL duration of the wrapped SecretID. |
@@ -1062,7 +1122,7 @@ public readonly roleName: string;
Name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#role_name ApproleAuthBackendRoleSecretId#role_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#role_name ApproleAuthBackendRoleSecretId#role_name}
---
@@ -1076,7 +1136,7 @@ public readonly backend: string;
Unique name of the auth backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#backend ApproleAuthBackendRoleSecretId#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#backend ApproleAuthBackendRoleSecretId#backend}
---
@@ -1090,7 +1150,7 @@ public readonly cidrList: string[];
List of CIDR blocks that can log in using the SecretID.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#cidr_list ApproleAuthBackendRoleSecretId#cidr_list}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#cidr_list ApproleAuthBackendRoleSecretId#cidr_list}
---
@@ -1102,7 +1162,7 @@ public readonly id: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#id ApproleAuthBackendRoleSecretId#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#id ApproleAuthBackendRoleSecretId#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1119,7 +1179,7 @@ public readonly metadata: string;
JSON-encoded secret data to write.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#metadata ApproleAuthBackendRoleSecretId#metadata}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#metadata ApproleAuthBackendRoleSecretId#metadata}
---
@@ -1133,7 +1193,21 @@ public readonly namespace: string;
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#namespace ApproleAuthBackendRoleSecretId#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#namespace ApproleAuthBackendRoleSecretId#namespace}
+
+---
+
+##### `numUses`Optional
+
+```typescript
+public readonly numUses: number;
+```
+
+- *Type:* number
+
+The number of uses for the secret-id.
+
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#num_uses ApproleAuthBackendRoleSecretId#num_uses}
---
@@ -1147,7 +1221,21 @@ public readonly secretId: string;
The SecretID to be managed. If not specified, Vault auto-generates one.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#secret_id ApproleAuthBackendRoleSecretId#secret_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#secret_id ApproleAuthBackendRoleSecretId#secret_id}
+
+---
+
+##### `ttl`Optional
+
+```typescript
+public readonly ttl: number;
+```
+
+- *Type:* number
+
+The TTL duration of the SecretID.
+
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#ttl ApproleAuthBackendRoleSecretId#ttl}
---
@@ -1163,7 +1251,7 @@ Use the wrapped secret-id accessor as the id of this resource.
If false, a fresh secret-id will be regenerated whenever the wrapping token is expired or invalidated through unwrapping.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#with_wrapped_accessor ApproleAuthBackendRoleSecretId#with_wrapped_accessor}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#with_wrapped_accessor ApproleAuthBackendRoleSecretId#with_wrapped_accessor}
---
@@ -1177,7 +1265,7 @@ public readonly wrappingTtl: string;
The TTL duration of the wrapped SecretID.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#wrapping_ttl ApproleAuthBackendRoleSecretId#wrapping_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#wrapping_ttl ApproleAuthBackendRoleSecretId#wrapping_ttl}
---
diff --git a/docs/audit.csharp.md b/docs/audit.csharp.md
index 24caff7a..f763a0c8 100644
--- a/docs/audit.csharp.md
+++ b/docs/audit.csharp.md
@@ -4,7 +4,7 @@
### Audit
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit vault_audit}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit vault_audit}.
#### Initializers
@@ -502,7 +502,7 @@ The construct id used in the generated config for the Audit to import.
The id of the existing Audit that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#import import section} in the documentation of this resource for the id to use
---
@@ -890,7 +890,7 @@ new AuditConfig {
| Options
| System.Collections.Generic.IDictionary
| Configuration options to pass to the audit device itself. |
| Type
| string
| Type of the audit device, such as 'file'. |
| Description
| string
| Human-friendly description of the audit device. |
-| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#id Audit#id}. |
+| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#id Audit#id}. |
| Local
| object
| Specifies if the audit device is a local only. |
| Namespace
| string
| Target namespace. (requires Enterprise). |
| Path
| string
| Path in which to enable the audit device. |
@@ -977,7 +977,7 @@ public System.Collections.Generic.IDictionary Options { get; set
Configuration options to pass to the audit device itself.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#options Audit#options}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#options Audit#options}
---
@@ -991,7 +991,7 @@ public string Type { get; set; }
Type of the audit device, such as 'file'.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#type Audit#type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#type Audit#type}
---
@@ -1005,7 +1005,7 @@ public string Description { get; set; }
Human-friendly description of the audit device.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#description Audit#description}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#description Audit#description}
---
@@ -1017,7 +1017,7 @@ public string Id { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#id Audit#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#id Audit#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1036,7 +1036,7 @@ Specifies if the audit device is a local only.
Local audit devices are not replicated nor (if a secondary) removed by replication.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#local Audit#local}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#local Audit#local}
---
@@ -1050,7 +1050,7 @@ public string Namespace { get; set; }
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#namespace Audit#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#namespace Audit#namespace}
---
@@ -1064,7 +1064,7 @@ public string Path { get; set; }
Path in which to enable the audit device.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#path Audit#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#path Audit#path}
---
diff --git a/docs/audit.go.md b/docs/audit.go.md
index 029c2bab..fa62fb7f 100644
--- a/docs/audit.go.md
+++ b/docs/audit.go.md
@@ -4,7 +4,7 @@
### Audit
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit vault_audit}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit vault_audit}.
#### Initializers
@@ -502,7 +502,7 @@ The construct id used in the generated config for the Audit to import.
The id of the existing Audit that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#import import section} in the documentation of this resource for the id to use
---
@@ -890,7 +890,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/audit"
| Options
| *map[string]*string
| Configuration options to pass to the audit device itself. |
| Type
| *string
| Type of the audit device, such as 'file'. |
| Description
| *string
| Human-friendly description of the audit device. |
-| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#id Audit#id}. |
+| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#id Audit#id}. |
| Local
| interface{}
| Specifies if the audit device is a local only. |
| Namespace
| *string
| Target namespace. (requires Enterprise). |
| Path
| *string
| Path in which to enable the audit device. |
@@ -977,7 +977,7 @@ Options *map[string]*string
Configuration options to pass to the audit device itself.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#options Audit#options}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#options Audit#options}
---
@@ -991,7 +991,7 @@ Type *string
Type of the audit device, such as 'file'.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#type Audit#type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#type Audit#type}
---
@@ -1005,7 +1005,7 @@ Description *string
Human-friendly description of the audit device.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#description Audit#description}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#description Audit#description}
---
@@ -1017,7 +1017,7 @@ Id *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#id Audit#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#id Audit#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1036,7 +1036,7 @@ Specifies if the audit device is a local only.
Local audit devices are not replicated nor (if a secondary) removed by replication.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#local Audit#local}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#local Audit#local}
---
@@ -1050,7 +1050,7 @@ Namespace *string
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#namespace Audit#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#namespace Audit#namespace}
---
@@ -1064,7 +1064,7 @@ Path *string
Path in which to enable the audit device.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#path Audit#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#path Audit#path}
---
diff --git a/docs/audit.java.md b/docs/audit.java.md
index edc8cf27..3317cc3f 100644
--- a/docs/audit.java.md
+++ b/docs/audit.java.md
@@ -4,7 +4,7 @@
### Audit
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit vault_audit}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit vault_audit}.
#### Initializers
@@ -48,7 +48,7 @@ Audit.Builder.create(Construct scope, java.lang.String id)
| options
| java.util.Map
| Configuration options to pass to the audit device itself. |
| type
| java.lang.String
| Type of the audit device, such as 'file'. |
| description
| java.lang.String
| Human-friendly description of the audit device. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#id Audit#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#id Audit#id}. |
| local
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| Specifies if the audit device is a local only. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
| path
| java.lang.String
| Path in which to enable the audit device. |
@@ -121,7 +121,7 @@ Must be unique amongst siblings in the same scope
Configuration options to pass to the audit device itself.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#options Audit#options}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#options Audit#options}
---
@@ -131,7 +131,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Type of the audit device, such as 'file'.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#type Audit#type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#type Audit#type}
---
@@ -141,7 +141,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Human-friendly description of the audit device.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#description Audit#description}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#description Audit#description}
---
@@ -149,7 +149,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#id Audit#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#id Audit#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -164,7 +164,7 @@ Specifies if the audit device is a local only.
Local audit devices are not replicated nor (if a secondary) removed by replication.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#local Audit#local}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#local Audit#local}
---
@@ -174,7 +174,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#namespace Audit#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#namespace Audit#namespace}
---
@@ -184,7 +184,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Path in which to enable the audit device.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#path Audit#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#path Audit#path}
---
@@ -646,7 +646,7 @@ The construct id used in the generated config for the Audit to import.
The id of the existing Audit that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#import import section} in the documentation of this resource for the id to use
---
@@ -1039,7 +1039,7 @@ AuditConfig.builder()
| options
| java.util.Map
| Configuration options to pass to the audit device itself. |
| type
| java.lang.String
| Type of the audit device, such as 'file'. |
| description
| java.lang.String
| Human-friendly description of the audit device. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#id Audit#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#id Audit#id}. |
| local
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| Specifies if the audit device is a local only. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
| path
| java.lang.String
| Path in which to enable the audit device. |
@@ -1126,7 +1126,7 @@ public java.util.Map getOptions();
Configuration options to pass to the audit device itself.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#options Audit#options}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#options Audit#options}
---
@@ -1140,7 +1140,7 @@ public java.lang.String getType();
Type of the audit device, such as 'file'.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#type Audit#type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#type Audit#type}
---
@@ -1154,7 +1154,7 @@ public java.lang.String getDescription();
Human-friendly description of the audit device.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#description Audit#description}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#description Audit#description}
---
@@ -1166,7 +1166,7 @@ public java.lang.String getId();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#id Audit#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#id Audit#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1185,7 +1185,7 @@ Specifies if the audit device is a local only.
Local audit devices are not replicated nor (if a secondary) removed by replication.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#local Audit#local}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#local Audit#local}
---
@@ -1199,7 +1199,7 @@ public java.lang.String getNamespace();
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#namespace Audit#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#namespace Audit#namespace}
---
@@ -1213,7 +1213,7 @@ public java.lang.String getPath();
Path in which to enable the audit device.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#path Audit#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#path Audit#path}
---
diff --git a/docs/audit.python.md b/docs/audit.python.md
index d78280f5..e698b790 100644
--- a/docs/audit.python.md
+++ b/docs/audit.python.md
@@ -4,7 +4,7 @@
### Audit
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit vault_audit}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit vault_audit}.
#### Initializers
@@ -45,7 +45,7 @@ audit.Audit(
| options
| typing.Mapping[str]
| Configuration options to pass to the audit device itself. |
| type
| str
| Type of the audit device, such as 'file'. |
| description
| str
| Human-friendly description of the audit device. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#id Audit#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#id Audit#id}. |
| local
| typing.Union[bool, cdktf.IResolvable]
| Specifies if the audit device is a local only. |
| namespace
| str
| Target namespace. (requires Enterprise). |
| path
| str
| Path in which to enable the audit device. |
@@ -118,7 +118,7 @@ Must be unique amongst siblings in the same scope
Configuration options to pass to the audit device itself.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#options Audit#options}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#options Audit#options}
---
@@ -128,7 +128,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Type of the audit device, such as 'file'.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#type Audit#type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#type Audit#type}
---
@@ -138,7 +138,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Human-friendly description of the audit device.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#description Audit#description}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#description Audit#description}
---
@@ -146,7 +146,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#id Audit#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#id Audit#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -161,7 +161,7 @@ Specifies if the audit device is a local only.
Local audit devices are not replicated nor (if a secondary) removed by replication.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#local Audit#local}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#local Audit#local}
---
@@ -171,7 +171,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#namespace Audit#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#namespace Audit#namespace}
---
@@ -181,7 +181,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Path in which to enable the audit device.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#path Audit#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#path Audit#path}
---
@@ -689,7 +689,7 @@ The construct id used in the generated config for the Audit to import.
The id of the existing Audit that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#import import section} in the documentation of this resource for the id to use
---
@@ -1077,7 +1077,7 @@ audit.AuditConfig(
| options
| typing.Mapping[str]
| Configuration options to pass to the audit device itself. |
| type
| str
| Type of the audit device, such as 'file'. |
| description
| str
| Human-friendly description of the audit device. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#id Audit#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#id Audit#id}. |
| local
| typing.Union[bool, cdktf.IResolvable]
| Specifies if the audit device is a local only. |
| namespace
| str
| Target namespace. (requires Enterprise). |
| path
| str
| Path in which to enable the audit device. |
@@ -1164,7 +1164,7 @@ options: typing.Mapping[str]
Configuration options to pass to the audit device itself.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#options Audit#options}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#options Audit#options}
---
@@ -1178,7 +1178,7 @@ type: str
Type of the audit device, such as 'file'.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#type Audit#type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#type Audit#type}
---
@@ -1192,7 +1192,7 @@ description: str
Human-friendly description of the audit device.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#description Audit#description}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#description Audit#description}
---
@@ -1204,7 +1204,7 @@ id: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#id Audit#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#id Audit#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1223,7 +1223,7 @@ Specifies if the audit device is a local only.
Local audit devices are not replicated nor (if a secondary) removed by replication.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#local Audit#local}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#local Audit#local}
---
@@ -1237,7 +1237,7 @@ namespace: str
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#namespace Audit#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#namespace Audit#namespace}
---
@@ -1251,7 +1251,7 @@ path: str
Path in which to enable the audit device.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#path Audit#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#path Audit#path}
---
diff --git a/docs/audit.typescript.md b/docs/audit.typescript.md
index 6c5c6dca..651f6d00 100644
--- a/docs/audit.typescript.md
+++ b/docs/audit.typescript.md
@@ -4,7 +4,7 @@
### Audit
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit vault_audit}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit vault_audit}.
#### Initializers
@@ -502,7 +502,7 @@ The construct id used in the generated config for the Audit to import.
The id of the existing Audit that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#import import section} in the documentation of this resource for the id to use
---
@@ -875,7 +875,7 @@ const auditConfig: audit.AuditConfig = { ... }
| options
| {[ key: string ]: string}
| Configuration options to pass to the audit device itself. |
| type
| string
| Type of the audit device, such as 'file'. |
| description
| string
| Human-friendly description of the audit device. |
-| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#id Audit#id}. |
+| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#id Audit#id}. |
| local
| boolean \| cdktf.IResolvable
| Specifies if the audit device is a local only. |
| namespace
| string
| Target namespace. (requires Enterprise). |
| path
| string
| Path in which to enable the audit device. |
@@ -962,7 +962,7 @@ public readonly options: {[ key: string ]: string};
Configuration options to pass to the audit device itself.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#options Audit#options}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#options Audit#options}
---
@@ -976,7 +976,7 @@ public readonly type: string;
Type of the audit device, such as 'file'.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#type Audit#type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#type Audit#type}
---
@@ -990,7 +990,7 @@ public readonly description: string;
Human-friendly description of the audit device.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#description Audit#description}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#description Audit#description}
---
@@ -1002,7 +1002,7 @@ public readonly id: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#id Audit#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#id Audit#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1021,7 +1021,7 @@ Specifies if the audit device is a local only.
Local audit devices are not replicated nor (if a secondary) removed by replication.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#local Audit#local}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#local Audit#local}
---
@@ -1035,7 +1035,7 @@ public readonly namespace: string;
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#namespace Audit#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#namespace Audit#namespace}
---
@@ -1049,7 +1049,7 @@ public readonly path: string;
Path in which to enable the audit device.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#path Audit#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#path Audit#path}
---
diff --git a/docs/auditRequestHeader.csharp.md b/docs/auditRequestHeader.csharp.md
index e5f6d6fc..d64d46f0 100644
--- a/docs/auditRequestHeader.csharp.md
+++ b/docs/auditRequestHeader.csharp.md
@@ -4,7 +4,7 @@
### AuditRequestHeader
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit_request_header vault_audit_request_header}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit_request_header vault_audit_request_header}.
#### Initializers
@@ -488,7 +488,7 @@ The construct id used in the generated config for the AuditRequestHeader to impo
The id of the existing AuditRequestHeader that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit_request_header#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit_request_header#import import section} in the documentation of this resource for the id to use
---
@@ -806,7 +806,7 @@ new AuditRequestHeaderConfig {
| Provisioners
| object[]
| *No description.* |
| Name
| string
| The name of the request header to audit. |
| Hmac
| object
| Whether this header's value should be HMAC'd in the audit logs. |
-| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit_request_header#id AuditRequestHeader#id}. |
+| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit_request_header#id AuditRequestHeader#id}. |
| Namespace
| string
| Target namespace. (requires Enterprise). |
---
@@ -891,7 +891,7 @@ public string Name { get; set; }
The name of the request header to audit.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit_request_header#name AuditRequestHeader#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit_request_header#name AuditRequestHeader#name}
---
@@ -905,7 +905,7 @@ public object Hmac { get; set; }
Whether this header's value should be HMAC'd in the audit logs.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit_request_header#hmac AuditRequestHeader#hmac}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit_request_header#hmac AuditRequestHeader#hmac}
---
@@ -917,7 +917,7 @@ public string Id { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit_request_header#id AuditRequestHeader#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit_request_header#id AuditRequestHeader#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -934,7 +934,7 @@ public string Namespace { get; set; }
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit_request_header#namespace AuditRequestHeader#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit_request_header#namespace AuditRequestHeader#namespace}
---
diff --git a/docs/auditRequestHeader.go.md b/docs/auditRequestHeader.go.md
index 0333842d..fa73f161 100644
--- a/docs/auditRequestHeader.go.md
+++ b/docs/auditRequestHeader.go.md
@@ -4,7 +4,7 @@
### AuditRequestHeader
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit_request_header vault_audit_request_header}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit_request_header vault_audit_request_header}.
#### Initializers
@@ -488,7 +488,7 @@ The construct id used in the generated config for the AuditRequestHeader to impo
The id of the existing AuditRequestHeader that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit_request_header#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit_request_header#import import section} in the documentation of this resource for the id to use
---
@@ -806,7 +806,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/auditrequestheader"
| Provisioners
| *[]interface{}
| *No description.* |
| Name
| *string
| The name of the request header to audit. |
| Hmac
| interface{}
| Whether this header's value should be HMAC'd in the audit logs. |
-| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit_request_header#id AuditRequestHeader#id}. |
+| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit_request_header#id AuditRequestHeader#id}. |
| Namespace
| *string
| Target namespace. (requires Enterprise). |
---
@@ -891,7 +891,7 @@ Name *string
The name of the request header to audit.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit_request_header#name AuditRequestHeader#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit_request_header#name AuditRequestHeader#name}
---
@@ -905,7 +905,7 @@ Hmac interface{}
Whether this header's value should be HMAC'd in the audit logs.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit_request_header#hmac AuditRequestHeader#hmac}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit_request_header#hmac AuditRequestHeader#hmac}
---
@@ -917,7 +917,7 @@ Id *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit_request_header#id AuditRequestHeader#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit_request_header#id AuditRequestHeader#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -934,7 +934,7 @@ Namespace *string
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit_request_header#namespace AuditRequestHeader#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit_request_header#namespace AuditRequestHeader#namespace}
---
diff --git a/docs/auditRequestHeader.java.md b/docs/auditRequestHeader.java.md
index 6d6a3e12..1eb361d7 100644
--- a/docs/auditRequestHeader.java.md
+++ b/docs/auditRequestHeader.java.md
@@ -4,7 +4,7 @@
### AuditRequestHeader
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit_request_header vault_audit_request_header}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit_request_header vault_audit_request_header}.
#### Initializers
@@ -44,7 +44,7 @@ AuditRequestHeader.Builder.create(Construct scope, java.lang.String id)
| provisioners
| java.util.List
| *No description.* |
| name
| java.lang.String
| The name of the request header to audit. |
| hmac
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| Whether this header's value should be HMAC'd in the audit logs. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit_request_header#id AuditRequestHeader#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit_request_header#id AuditRequestHeader#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
---
@@ -115,7 +115,7 @@ Must be unique amongst siblings in the same scope
The name of the request header to audit.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit_request_header#name AuditRequestHeader#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit_request_header#name AuditRequestHeader#name}
---
@@ -125,7 +125,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Whether this header's value should be HMAC'd in the audit logs.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit_request_header#hmac AuditRequestHeader#hmac}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit_request_header#hmac AuditRequestHeader#hmac}
---
@@ -133,7 +133,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit_request_header#id AuditRequestHeader#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit_request_header#id AuditRequestHeader#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -146,7 +146,7 @@ If you experience problems setting this value it might not be settable. Please t
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit_request_header#namespace AuditRequestHeader#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit_request_header#namespace AuditRequestHeader#namespace}
---
@@ -594,7 +594,7 @@ The construct id used in the generated config for the AuditRequestHeader to impo
The id of the existing AuditRequestHeader that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit_request_header#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit_request_header#import import section} in the documentation of this resource for the id to use
---
@@ -917,7 +917,7 @@ AuditRequestHeaderConfig.builder()
| provisioners
| java.util.List
| *No description.* |
| name
| java.lang.String
| The name of the request header to audit. |
| hmac
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| Whether this header's value should be HMAC'd in the audit logs. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit_request_header#id AuditRequestHeader#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit_request_header#id AuditRequestHeader#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
---
@@ -1002,7 +1002,7 @@ public java.lang.String getName();
The name of the request header to audit.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit_request_header#name AuditRequestHeader#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit_request_header#name AuditRequestHeader#name}
---
@@ -1016,7 +1016,7 @@ public java.lang.Object getHmac();
Whether this header's value should be HMAC'd in the audit logs.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit_request_header#hmac AuditRequestHeader#hmac}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit_request_header#hmac AuditRequestHeader#hmac}
---
@@ -1028,7 +1028,7 @@ public java.lang.String getId();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit_request_header#id AuditRequestHeader#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit_request_header#id AuditRequestHeader#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1045,7 +1045,7 @@ public java.lang.String getNamespace();
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit_request_header#namespace AuditRequestHeader#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit_request_header#namespace AuditRequestHeader#namespace}
---
diff --git a/docs/auditRequestHeader.python.md b/docs/auditRequestHeader.python.md
index 629b06f3..f1da1401 100644
--- a/docs/auditRequestHeader.python.md
+++ b/docs/auditRequestHeader.python.md
@@ -4,7 +4,7 @@
### AuditRequestHeader
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit_request_header vault_audit_request_header}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit_request_header vault_audit_request_header}.
#### Initializers
@@ -41,7 +41,7 @@ auditRequestHeader.AuditRequestHeader(
| provisioners
| typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]]
| *No description.* |
| name
| str
| The name of the request header to audit. |
| hmac
| typing.Union[bool, cdktf.IResolvable]
| Whether this header's value should be HMAC'd in the audit logs. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit_request_header#id AuditRequestHeader#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit_request_header#id AuditRequestHeader#id}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
---
@@ -112,7 +112,7 @@ Must be unique amongst siblings in the same scope
The name of the request header to audit.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit_request_header#name AuditRequestHeader#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit_request_header#name AuditRequestHeader#name}
---
@@ -122,7 +122,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Whether this header's value should be HMAC'd in the audit logs.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit_request_header#hmac AuditRequestHeader#hmac}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit_request_header#hmac AuditRequestHeader#hmac}
---
@@ -130,7 +130,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit_request_header#id AuditRequestHeader#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit_request_header#id AuditRequestHeader#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -143,7 +143,7 @@ If you experience problems setting this value it might not be settable. Please t
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit_request_header#namespace AuditRequestHeader#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit_request_header#namespace AuditRequestHeader#namespace}
---
@@ -637,7 +637,7 @@ The construct id used in the generated config for the AuditRequestHeader to impo
The id of the existing AuditRequestHeader that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit_request_header#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit_request_header#import import section} in the documentation of this resource for the id to use
---
@@ -955,7 +955,7 @@ auditRequestHeader.AuditRequestHeaderConfig(
| provisioners
| typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]]
| *No description.* |
| name
| str
| The name of the request header to audit. |
| hmac
| typing.Union[bool, cdktf.IResolvable]
| Whether this header's value should be HMAC'd in the audit logs. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit_request_header#id AuditRequestHeader#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit_request_header#id AuditRequestHeader#id}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
---
@@ -1040,7 +1040,7 @@ name: str
The name of the request header to audit.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit_request_header#name AuditRequestHeader#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit_request_header#name AuditRequestHeader#name}
---
@@ -1054,7 +1054,7 @@ hmac: typing.Union[bool, IResolvable]
Whether this header's value should be HMAC'd in the audit logs.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit_request_header#hmac AuditRequestHeader#hmac}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit_request_header#hmac AuditRequestHeader#hmac}
---
@@ -1066,7 +1066,7 @@ id: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit_request_header#id AuditRequestHeader#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit_request_header#id AuditRequestHeader#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1083,7 +1083,7 @@ namespace: str
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit_request_header#namespace AuditRequestHeader#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit_request_header#namespace AuditRequestHeader#namespace}
---
diff --git a/docs/auditRequestHeader.typescript.md b/docs/auditRequestHeader.typescript.md
index 3cf7a3e4..3d55f580 100644
--- a/docs/auditRequestHeader.typescript.md
+++ b/docs/auditRequestHeader.typescript.md
@@ -4,7 +4,7 @@
### AuditRequestHeader
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit_request_header vault_audit_request_header}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit_request_header vault_audit_request_header}.
#### Initializers
@@ -488,7 +488,7 @@ The construct id used in the generated config for the AuditRequestHeader to impo
The id of the existing AuditRequestHeader that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit_request_header#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit_request_header#import import section} in the documentation of this resource for the id to use
---
@@ -794,7 +794,7 @@ const auditRequestHeaderConfig: auditRequestHeader.AuditRequestHeaderConfig = {
| provisioners
| cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[]
| *No description.* |
| name
| string
| The name of the request header to audit. |
| hmac
| boolean \| cdktf.IResolvable
| Whether this header's value should be HMAC'd in the audit logs. |
-| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit_request_header#id AuditRequestHeader#id}. |
+| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit_request_header#id AuditRequestHeader#id}. |
| namespace
| string
| Target namespace. (requires Enterprise). |
---
@@ -879,7 +879,7 @@ public readonly name: string;
The name of the request header to audit.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit_request_header#name AuditRequestHeader#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit_request_header#name AuditRequestHeader#name}
---
@@ -893,7 +893,7 @@ public readonly hmac: boolean | IResolvable;
Whether this header's value should be HMAC'd in the audit logs.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit_request_header#hmac AuditRequestHeader#hmac}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit_request_header#hmac AuditRequestHeader#hmac}
---
@@ -905,7 +905,7 @@ public readonly id: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit_request_header#id AuditRequestHeader#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit_request_header#id AuditRequestHeader#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -922,7 +922,7 @@ public readonly namespace: string;
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit_request_header#namespace AuditRequestHeader#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit_request_header#namespace AuditRequestHeader#namespace}
---
diff --git a/docs/authBackend.csharp.md b/docs/authBackend.csharp.md
index 15313275..b6c8a139 100644
--- a/docs/authBackend.csharp.md
+++ b/docs/authBackend.csharp.md
@@ -4,7 +4,7 @@
### AuthBackend
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend vault_auth_backend}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend vault_auth_backend}.
#### Initializers
@@ -536,7 +536,7 @@ The construct id used in the generated config for the AuthBackend to import.
The id of the existing AuthBackend that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#import import section} in the documentation of this resource for the id to use
---
@@ -981,12 +981,12 @@ new AuthBackendConfig {
| Type
| string
| Name of the auth backend. |
| Description
| string
| The description of the auth backend. |
| DisableRemount
| object
| If set, opts out of mount migration on path updates. |
-| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#id AuthBackend#id}. |
+| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#id AuthBackend#id}. |
| IdentityTokenKey
| string
| The key to use for signing identity tokens. |
| Local
| object
| Specifies if the auth method is local only. |
| Namespace
| string
| Target namespace. (requires Enterprise). |
| Path
| string
| path to mount the backend. This defaults to the type. |
-| Tune
| object
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#tune AuthBackend#tune}. |
+| Tune
| object
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#tune AuthBackend#tune}. |
---
@@ -1070,7 +1070,7 @@ public string Type { get; set; }
Name of the auth backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#type AuthBackend#type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#type AuthBackend#type}
---
@@ -1084,7 +1084,7 @@ public string Description { get; set; }
The description of the auth backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#description AuthBackend#description}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#description AuthBackend#description}
---
@@ -1098,7 +1098,7 @@ public object DisableRemount { get; set; }
If set, opts out of mount migration on path updates.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#disable_remount AuthBackend#disable_remount}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#disable_remount AuthBackend#disable_remount}
---
@@ -1110,7 +1110,7 @@ public string Id { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#id AuthBackend#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#id AuthBackend#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1127,7 +1127,7 @@ public string IdentityTokenKey { get; set; }
The key to use for signing identity tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#identity_token_key AuthBackend#identity_token_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#identity_token_key AuthBackend#identity_token_key}
---
@@ -1141,7 +1141,7 @@ public object Local { get; set; }
Specifies if the auth method is local only.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#local AuthBackend#local}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#local AuthBackend#local}
---
@@ -1155,7 +1155,7 @@ public string Namespace { get; set; }
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#namespace AuthBackend#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#namespace AuthBackend#namespace}
---
@@ -1169,7 +1169,7 @@ public string Path { get; set; }
path to mount the backend. This defaults to the type.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#path AuthBackend#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#path AuthBackend#path}
---
@@ -1181,7 +1181,7 @@ public object Tune { get; set; }
- *Type:* object
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#tune AuthBackend#tune}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#tune AuthBackend#tune}.
---
@@ -1208,14 +1208,14 @@ new AuthBackendTune {
| **Name** | **Type** | **Description** |
| --- | --- | --- |
-| AllowedResponseHeaders
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#allowed_response_headers AuthBackend#allowed_response_headers}. |
-| AuditNonHmacRequestKeys
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#audit_non_hmac_request_keys AuthBackend#audit_non_hmac_request_keys}. |
-| AuditNonHmacResponseKeys
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#audit_non_hmac_response_keys AuthBackend#audit_non_hmac_response_keys}. |
-| DefaultLeaseTtl
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#default_lease_ttl AuthBackend#default_lease_ttl}. |
-| ListingVisibility
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#listing_visibility AuthBackend#listing_visibility}. |
-| MaxLeaseTtl
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#max_lease_ttl AuthBackend#max_lease_ttl}. |
-| PassthroughRequestHeaders
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#passthrough_request_headers AuthBackend#passthrough_request_headers}. |
-| TokenType
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#token_type AuthBackend#token_type}. |
+| AllowedResponseHeaders
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#allowed_response_headers AuthBackend#allowed_response_headers}. |
+| AuditNonHmacRequestKeys
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#audit_non_hmac_request_keys AuthBackend#audit_non_hmac_request_keys}. |
+| AuditNonHmacResponseKeys
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#audit_non_hmac_response_keys AuthBackend#audit_non_hmac_response_keys}. |
+| DefaultLeaseTtl
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#default_lease_ttl AuthBackend#default_lease_ttl}. |
+| ListingVisibility
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#listing_visibility AuthBackend#listing_visibility}. |
+| MaxLeaseTtl
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#max_lease_ttl AuthBackend#max_lease_ttl}. |
+| PassthroughRequestHeaders
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#passthrough_request_headers AuthBackend#passthrough_request_headers}. |
+| TokenType
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#token_type AuthBackend#token_type}. |
---
@@ -1227,7 +1227,7 @@ public string[] AllowedResponseHeaders { get; set; }
- *Type:* string[]
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#allowed_response_headers AuthBackend#allowed_response_headers}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#allowed_response_headers AuthBackend#allowed_response_headers}.
---
@@ -1239,7 +1239,7 @@ public string[] AuditNonHmacRequestKeys { get; set; }
- *Type:* string[]
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#audit_non_hmac_request_keys AuthBackend#audit_non_hmac_request_keys}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#audit_non_hmac_request_keys AuthBackend#audit_non_hmac_request_keys}.
---
@@ -1251,7 +1251,7 @@ public string[] AuditNonHmacResponseKeys { get; set; }
- *Type:* string[]
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#audit_non_hmac_response_keys AuthBackend#audit_non_hmac_response_keys}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#audit_non_hmac_response_keys AuthBackend#audit_non_hmac_response_keys}.
---
@@ -1263,7 +1263,7 @@ public string DefaultLeaseTtl { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#default_lease_ttl AuthBackend#default_lease_ttl}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#default_lease_ttl AuthBackend#default_lease_ttl}.
---
@@ -1275,7 +1275,7 @@ public string ListingVisibility { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#listing_visibility AuthBackend#listing_visibility}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#listing_visibility AuthBackend#listing_visibility}.
---
@@ -1287,7 +1287,7 @@ public string MaxLeaseTtl { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#max_lease_ttl AuthBackend#max_lease_ttl}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#max_lease_ttl AuthBackend#max_lease_ttl}.
---
@@ -1299,7 +1299,7 @@ public string[] PassthroughRequestHeaders { get; set; }
- *Type:* string[]
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#passthrough_request_headers AuthBackend#passthrough_request_headers}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#passthrough_request_headers AuthBackend#passthrough_request_headers}.
---
@@ -1311,7 +1311,7 @@ public string TokenType { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#token_type AuthBackend#token_type}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#token_type AuthBackend#token_type}.
---
diff --git a/docs/authBackend.go.md b/docs/authBackend.go.md
index 1dbec011..0d1de4b8 100644
--- a/docs/authBackend.go.md
+++ b/docs/authBackend.go.md
@@ -4,7 +4,7 @@
### AuthBackend
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend vault_auth_backend}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend vault_auth_backend}.
#### Initializers
@@ -536,7 +536,7 @@ The construct id used in the generated config for the AuthBackend to import.
The id of the existing AuthBackend that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#import import section} in the documentation of this resource for the id to use
---
@@ -981,12 +981,12 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/authbackend"
| Type
| *string
| Name of the auth backend. |
| Description
| *string
| The description of the auth backend. |
| DisableRemount
| interface{}
| If set, opts out of mount migration on path updates. |
-| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#id AuthBackend#id}. |
+| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#id AuthBackend#id}. |
| IdentityTokenKey
| *string
| The key to use for signing identity tokens. |
| Local
| interface{}
| Specifies if the auth method is local only. |
| Namespace
| *string
| Target namespace. (requires Enterprise). |
| Path
| *string
| path to mount the backend. This defaults to the type. |
-| Tune
| interface{}
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#tune AuthBackend#tune}. |
+| Tune
| interface{}
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#tune AuthBackend#tune}. |
---
@@ -1070,7 +1070,7 @@ Type *string
Name of the auth backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#type AuthBackend#type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#type AuthBackend#type}
---
@@ -1084,7 +1084,7 @@ Description *string
The description of the auth backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#description AuthBackend#description}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#description AuthBackend#description}
---
@@ -1098,7 +1098,7 @@ DisableRemount interface{}
If set, opts out of mount migration on path updates.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#disable_remount AuthBackend#disable_remount}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#disable_remount AuthBackend#disable_remount}
---
@@ -1110,7 +1110,7 @@ Id *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#id AuthBackend#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#id AuthBackend#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1127,7 +1127,7 @@ IdentityTokenKey *string
The key to use for signing identity tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#identity_token_key AuthBackend#identity_token_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#identity_token_key AuthBackend#identity_token_key}
---
@@ -1141,7 +1141,7 @@ Local interface{}
Specifies if the auth method is local only.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#local AuthBackend#local}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#local AuthBackend#local}
---
@@ -1155,7 +1155,7 @@ Namespace *string
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#namespace AuthBackend#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#namespace AuthBackend#namespace}
---
@@ -1169,7 +1169,7 @@ Path *string
path to mount the backend. This defaults to the type.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#path AuthBackend#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#path AuthBackend#path}
---
@@ -1181,7 +1181,7 @@ Tune interface{}
- *Type:* interface{}
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#tune AuthBackend#tune}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#tune AuthBackend#tune}.
---
@@ -1208,14 +1208,14 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/authbackend"
| **Name** | **Type** | **Description** |
| --- | --- | --- |
-| AllowedResponseHeaders
| *[]*string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#allowed_response_headers AuthBackend#allowed_response_headers}. |
-| AuditNonHmacRequestKeys
| *[]*string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#audit_non_hmac_request_keys AuthBackend#audit_non_hmac_request_keys}. |
-| AuditNonHmacResponseKeys
| *[]*string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#audit_non_hmac_response_keys AuthBackend#audit_non_hmac_response_keys}. |
-| DefaultLeaseTtl
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#default_lease_ttl AuthBackend#default_lease_ttl}. |
-| ListingVisibility
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#listing_visibility AuthBackend#listing_visibility}. |
-| MaxLeaseTtl
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#max_lease_ttl AuthBackend#max_lease_ttl}. |
-| PassthroughRequestHeaders
| *[]*string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#passthrough_request_headers AuthBackend#passthrough_request_headers}. |
-| TokenType
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#token_type AuthBackend#token_type}. |
+| AllowedResponseHeaders
| *[]*string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#allowed_response_headers AuthBackend#allowed_response_headers}. |
+| AuditNonHmacRequestKeys
| *[]*string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#audit_non_hmac_request_keys AuthBackend#audit_non_hmac_request_keys}. |
+| AuditNonHmacResponseKeys
| *[]*string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#audit_non_hmac_response_keys AuthBackend#audit_non_hmac_response_keys}. |
+| DefaultLeaseTtl
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#default_lease_ttl AuthBackend#default_lease_ttl}. |
+| ListingVisibility
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#listing_visibility AuthBackend#listing_visibility}. |
+| MaxLeaseTtl
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#max_lease_ttl AuthBackend#max_lease_ttl}. |
+| PassthroughRequestHeaders
| *[]*string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#passthrough_request_headers AuthBackend#passthrough_request_headers}. |
+| TokenType
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#token_type AuthBackend#token_type}. |
---
@@ -1227,7 +1227,7 @@ AllowedResponseHeaders *[]*string
- *Type:* *[]*string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#allowed_response_headers AuthBackend#allowed_response_headers}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#allowed_response_headers AuthBackend#allowed_response_headers}.
---
@@ -1239,7 +1239,7 @@ AuditNonHmacRequestKeys *[]*string
- *Type:* *[]*string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#audit_non_hmac_request_keys AuthBackend#audit_non_hmac_request_keys}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#audit_non_hmac_request_keys AuthBackend#audit_non_hmac_request_keys}.
---
@@ -1251,7 +1251,7 @@ AuditNonHmacResponseKeys *[]*string
- *Type:* *[]*string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#audit_non_hmac_response_keys AuthBackend#audit_non_hmac_response_keys}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#audit_non_hmac_response_keys AuthBackend#audit_non_hmac_response_keys}.
---
@@ -1263,7 +1263,7 @@ DefaultLeaseTtl *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#default_lease_ttl AuthBackend#default_lease_ttl}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#default_lease_ttl AuthBackend#default_lease_ttl}.
---
@@ -1275,7 +1275,7 @@ ListingVisibility *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#listing_visibility AuthBackend#listing_visibility}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#listing_visibility AuthBackend#listing_visibility}.
---
@@ -1287,7 +1287,7 @@ MaxLeaseTtl *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#max_lease_ttl AuthBackend#max_lease_ttl}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#max_lease_ttl AuthBackend#max_lease_ttl}.
---
@@ -1299,7 +1299,7 @@ PassthroughRequestHeaders *[]*string
- *Type:* *[]*string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#passthrough_request_headers AuthBackend#passthrough_request_headers}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#passthrough_request_headers AuthBackend#passthrough_request_headers}.
---
@@ -1311,7 +1311,7 @@ TokenType *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#token_type AuthBackend#token_type}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#token_type AuthBackend#token_type}.
---
diff --git a/docs/authBackend.java.md b/docs/authBackend.java.md
index 1e5fac8a..ce942a0e 100644
--- a/docs/authBackend.java.md
+++ b/docs/authBackend.java.md
@@ -4,7 +4,7 @@
### AuthBackend
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend vault_auth_backend}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend vault_auth_backend}.
#### Initializers
@@ -52,12 +52,12 @@ AuthBackend.Builder.create(Construct scope, java.lang.String id)
| type
| java.lang.String
| Name of the auth backend. |
| description
| java.lang.String
| The description of the auth backend. |
| disableRemount
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| If set, opts out of mount migration on path updates. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#id AuthBackend#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#id AuthBackend#id}. |
| identityTokenKey
| java.lang.String
| The key to use for signing identity tokens. |
| local
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| Specifies if the auth method is local only. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
| path
| java.lang.String
| path to mount the backend. This defaults to the type. |
-| tune
| com.hashicorp.cdktf.IResolvable OR java.util.List<AuthBackendTune>
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#tune AuthBackend#tune}. |
+| tune
| com.hashicorp.cdktf.IResolvable OR java.util.List<AuthBackendTune>
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#tune AuthBackend#tune}. |
---
@@ -127,7 +127,7 @@ Must be unique amongst siblings in the same scope
Name of the auth backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#type AuthBackend#type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#type AuthBackend#type}
---
@@ -137,7 +137,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The description of the auth backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#description AuthBackend#description}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#description AuthBackend#description}
---
@@ -147,7 +147,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
If set, opts out of mount migration on path updates.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#disable_remount AuthBackend#disable_remount}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#disable_remount AuthBackend#disable_remount}
---
@@ -155,7 +155,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#id AuthBackend#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#id AuthBackend#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -168,7 +168,7 @@ If you experience problems setting this value it might not be settable. Please t
The key to use for signing identity tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#identity_token_key AuthBackend#identity_token_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#identity_token_key AuthBackend#identity_token_key}
---
@@ -178,7 +178,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Specifies if the auth method is local only.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#local AuthBackend#local}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#local AuthBackend#local}
---
@@ -188,7 +188,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#namespace AuthBackend#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#namespace AuthBackend#namespace}
---
@@ -198,7 +198,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
path to mount the backend. This defaults to the type.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#path AuthBackend#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#path AuthBackend#path}
---
@@ -206,7 +206,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* com.hashicorp.cdktf.IResolvable OR java.util.List<AuthBackendTune>
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#tune AuthBackend#tune}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#tune AuthBackend#tune}.
---
@@ -702,7 +702,7 @@ The construct id used in the generated config for the AuthBackend to import.
The id of the existing AuthBackend that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#import import section} in the documentation of this resource for the id to use
---
@@ -1154,12 +1154,12 @@ AuthBackendConfig.builder()
| type
| java.lang.String
| Name of the auth backend. |
| description
| java.lang.String
| The description of the auth backend. |
| disableRemount
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| If set, opts out of mount migration on path updates. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#id AuthBackend#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#id AuthBackend#id}. |
| identityTokenKey
| java.lang.String
| The key to use for signing identity tokens. |
| local
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| Specifies if the auth method is local only. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
| path
| java.lang.String
| path to mount the backend. This defaults to the type. |
-| tune
| com.hashicorp.cdktf.IResolvable OR java.util.List<AuthBackendTune>
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#tune AuthBackend#tune}. |
+| tune
| com.hashicorp.cdktf.IResolvable OR java.util.List<AuthBackendTune>
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#tune AuthBackend#tune}. |
---
@@ -1243,7 +1243,7 @@ public java.lang.String getType();
Name of the auth backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#type AuthBackend#type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#type AuthBackend#type}
---
@@ -1257,7 +1257,7 @@ public java.lang.String getDescription();
The description of the auth backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#description AuthBackend#description}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#description AuthBackend#description}
---
@@ -1271,7 +1271,7 @@ public java.lang.Object getDisableRemount();
If set, opts out of mount migration on path updates.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#disable_remount AuthBackend#disable_remount}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#disable_remount AuthBackend#disable_remount}
---
@@ -1283,7 +1283,7 @@ public java.lang.String getId();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#id AuthBackend#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#id AuthBackend#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1300,7 +1300,7 @@ public java.lang.String getIdentityTokenKey();
The key to use for signing identity tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#identity_token_key AuthBackend#identity_token_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#identity_token_key AuthBackend#identity_token_key}
---
@@ -1314,7 +1314,7 @@ public java.lang.Object getLocal();
Specifies if the auth method is local only.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#local AuthBackend#local}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#local AuthBackend#local}
---
@@ -1328,7 +1328,7 @@ public java.lang.String getNamespace();
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#namespace AuthBackend#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#namespace AuthBackend#namespace}
---
@@ -1342,7 +1342,7 @@ public java.lang.String getPath();
path to mount the backend. This defaults to the type.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#path AuthBackend#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#path AuthBackend#path}
---
@@ -1354,7 +1354,7 @@ public java.lang.Object getTune();
- *Type:* com.hashicorp.cdktf.IResolvable OR java.util.List<AuthBackendTune>
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#tune AuthBackend#tune}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#tune AuthBackend#tune}.
---
@@ -1381,14 +1381,14 @@ AuthBackendTune.builder()
| **Name** | **Type** | **Description** |
| --- | --- | --- |
-| allowedResponseHeaders
| java.util.List
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#allowed_response_headers AuthBackend#allowed_response_headers}. |
-| auditNonHmacRequestKeys
| java.util.List
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#audit_non_hmac_request_keys AuthBackend#audit_non_hmac_request_keys}. |
-| auditNonHmacResponseKeys
| java.util.List
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#audit_non_hmac_response_keys AuthBackend#audit_non_hmac_response_keys}. |
-| defaultLeaseTtl
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#default_lease_ttl AuthBackend#default_lease_ttl}. |
-| listingVisibility
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#listing_visibility AuthBackend#listing_visibility}. |
-| maxLeaseTtl
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#max_lease_ttl AuthBackend#max_lease_ttl}. |
-| passthroughRequestHeaders
| java.util.List
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#passthrough_request_headers AuthBackend#passthrough_request_headers}. |
-| tokenType
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#token_type AuthBackend#token_type}. |
+| allowedResponseHeaders
| java.util.List
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#allowed_response_headers AuthBackend#allowed_response_headers}. |
+| auditNonHmacRequestKeys
| java.util.List
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#audit_non_hmac_request_keys AuthBackend#audit_non_hmac_request_keys}. |
+| auditNonHmacResponseKeys
| java.util.List
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#audit_non_hmac_response_keys AuthBackend#audit_non_hmac_response_keys}. |
+| defaultLeaseTtl
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#default_lease_ttl AuthBackend#default_lease_ttl}. |
+| listingVisibility
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#listing_visibility AuthBackend#listing_visibility}. |
+| maxLeaseTtl
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#max_lease_ttl AuthBackend#max_lease_ttl}. |
+| passthroughRequestHeaders
| java.util.List
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#passthrough_request_headers AuthBackend#passthrough_request_headers}. |
+| tokenType
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#token_type AuthBackend#token_type}. |
---
@@ -1400,7 +1400,7 @@ public java.util.List getAllowedResponseHeaders();
- *Type:* java.util.List
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#allowed_response_headers AuthBackend#allowed_response_headers}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#allowed_response_headers AuthBackend#allowed_response_headers}.
---
@@ -1412,7 +1412,7 @@ public java.util.List getAuditNonHmacRequestKeys();
- *Type:* java.util.List
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#audit_non_hmac_request_keys AuthBackend#audit_non_hmac_request_keys}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#audit_non_hmac_request_keys AuthBackend#audit_non_hmac_request_keys}.
---
@@ -1424,7 +1424,7 @@ public java.util.List getAuditNonHmacResponseKeys();
- *Type:* java.util.List
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#audit_non_hmac_response_keys AuthBackend#audit_non_hmac_response_keys}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#audit_non_hmac_response_keys AuthBackend#audit_non_hmac_response_keys}.
---
@@ -1436,7 +1436,7 @@ public java.lang.String getDefaultLeaseTtl();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#default_lease_ttl AuthBackend#default_lease_ttl}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#default_lease_ttl AuthBackend#default_lease_ttl}.
---
@@ -1448,7 +1448,7 @@ public java.lang.String getListingVisibility();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#listing_visibility AuthBackend#listing_visibility}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#listing_visibility AuthBackend#listing_visibility}.
---
@@ -1460,7 +1460,7 @@ public java.lang.String getMaxLeaseTtl();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#max_lease_ttl AuthBackend#max_lease_ttl}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#max_lease_ttl AuthBackend#max_lease_ttl}.
---
@@ -1472,7 +1472,7 @@ public java.util.List getPassthroughRequestHeaders();
- *Type:* java.util.List
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#passthrough_request_headers AuthBackend#passthrough_request_headers}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#passthrough_request_headers AuthBackend#passthrough_request_headers}.
---
@@ -1484,7 +1484,7 @@ public java.lang.String getTokenType();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#token_type AuthBackend#token_type}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#token_type AuthBackend#token_type}.
---
diff --git a/docs/authBackend.python.md b/docs/authBackend.python.md
index 32a36a40..28e97185 100644
--- a/docs/authBackend.python.md
+++ b/docs/authBackend.python.md
@@ -4,7 +4,7 @@
### AuthBackend
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend vault_auth_backend}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend vault_auth_backend}.
#### Initializers
@@ -47,12 +47,12 @@ authBackend.AuthBackend(
| type
| str
| Name of the auth backend. |
| description
| str
| The description of the auth backend. |
| disable_remount
| typing.Union[bool, cdktf.IResolvable]
| If set, opts out of mount migration on path updates. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#id AuthBackend#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#id AuthBackend#id}. |
| identity_token_key
| str
| The key to use for signing identity tokens. |
| local
| typing.Union[bool, cdktf.IResolvable]
| Specifies if the auth method is local only. |
| namespace
| str
| Target namespace. (requires Enterprise). |
| path
| str
| path to mount the backend. This defaults to the type. |
-| tune
| typing.Union[cdktf.IResolvable, typing.List[AuthBackendTune]]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#tune AuthBackend#tune}. |
+| tune
| typing.Union[cdktf.IResolvable, typing.List[AuthBackendTune]]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#tune AuthBackend#tune}. |
---
@@ -122,7 +122,7 @@ Must be unique amongst siblings in the same scope
Name of the auth backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#type AuthBackend#type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#type AuthBackend#type}
---
@@ -132,7 +132,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The description of the auth backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#description AuthBackend#description}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#description AuthBackend#description}
---
@@ -142,7 +142,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
If set, opts out of mount migration on path updates.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#disable_remount AuthBackend#disable_remount}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#disable_remount AuthBackend#disable_remount}
---
@@ -150,7 +150,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#id AuthBackend#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#id AuthBackend#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -163,7 +163,7 @@ If you experience problems setting this value it might not be settable. Please t
The key to use for signing identity tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#identity_token_key AuthBackend#identity_token_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#identity_token_key AuthBackend#identity_token_key}
---
@@ -173,7 +173,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Specifies if the auth method is local only.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#local AuthBackend#local}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#local AuthBackend#local}
---
@@ -183,7 +183,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#namespace AuthBackend#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#namespace AuthBackend#namespace}
---
@@ -193,7 +193,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
path to mount the backend. This defaults to the type.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#path AuthBackend#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#path AuthBackend#path}
---
@@ -201,7 +201,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* typing.Union[cdktf.IResolvable, typing.List[AuthBackendTune]]
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#tune AuthBackend#tune}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#tune AuthBackend#tune}.
---
@@ -745,7 +745,7 @@ The construct id used in the generated config for the AuthBackend to import.
The id of the existing AuthBackend that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#import import section} in the documentation of this resource for the id to use
---
@@ -1190,12 +1190,12 @@ authBackend.AuthBackendConfig(
| type
| str
| Name of the auth backend. |
| description
| str
| The description of the auth backend. |
| disable_remount
| typing.Union[bool, cdktf.IResolvable]
| If set, opts out of mount migration on path updates. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#id AuthBackend#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#id AuthBackend#id}. |
| identity_token_key
| str
| The key to use for signing identity tokens. |
| local
| typing.Union[bool, cdktf.IResolvable]
| Specifies if the auth method is local only. |
| namespace
| str
| Target namespace. (requires Enterprise). |
| path
| str
| path to mount the backend. This defaults to the type. |
-| tune
| typing.Union[cdktf.IResolvable, typing.List[AuthBackendTune]]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#tune AuthBackend#tune}. |
+| tune
| typing.Union[cdktf.IResolvable, typing.List[AuthBackendTune]]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#tune AuthBackend#tune}. |
---
@@ -1279,7 +1279,7 @@ type: str
Name of the auth backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#type AuthBackend#type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#type AuthBackend#type}
---
@@ -1293,7 +1293,7 @@ description: str
The description of the auth backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#description AuthBackend#description}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#description AuthBackend#description}
---
@@ -1307,7 +1307,7 @@ disable_remount: typing.Union[bool, IResolvable]
If set, opts out of mount migration on path updates.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#disable_remount AuthBackend#disable_remount}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#disable_remount AuthBackend#disable_remount}
---
@@ -1319,7 +1319,7 @@ id: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#id AuthBackend#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#id AuthBackend#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1336,7 +1336,7 @@ identity_token_key: str
The key to use for signing identity tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#identity_token_key AuthBackend#identity_token_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#identity_token_key AuthBackend#identity_token_key}
---
@@ -1350,7 +1350,7 @@ local: typing.Union[bool, IResolvable]
Specifies if the auth method is local only.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#local AuthBackend#local}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#local AuthBackend#local}
---
@@ -1364,7 +1364,7 @@ namespace: str
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#namespace AuthBackend#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#namespace AuthBackend#namespace}
---
@@ -1378,7 +1378,7 @@ path: str
path to mount the backend. This defaults to the type.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#path AuthBackend#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#path AuthBackend#path}
---
@@ -1390,7 +1390,7 @@ tune: typing.Union[IResolvable, typing.List[AuthBackendTune]]
- *Type:* typing.Union[cdktf.IResolvable, typing.List[AuthBackendTune]]
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#tune AuthBackend#tune}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#tune AuthBackend#tune}.
---
@@ -1417,14 +1417,14 @@ authBackend.AuthBackendTune(
| **Name** | **Type** | **Description** |
| --- | --- | --- |
-| allowed_response_headers
| typing.List[str]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#allowed_response_headers AuthBackend#allowed_response_headers}. |
-| audit_non_hmac_request_keys
| typing.List[str]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#audit_non_hmac_request_keys AuthBackend#audit_non_hmac_request_keys}. |
-| audit_non_hmac_response_keys
| typing.List[str]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#audit_non_hmac_response_keys AuthBackend#audit_non_hmac_response_keys}. |
-| default_lease_ttl
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#default_lease_ttl AuthBackend#default_lease_ttl}. |
-| listing_visibility
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#listing_visibility AuthBackend#listing_visibility}. |
-| max_lease_ttl
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#max_lease_ttl AuthBackend#max_lease_ttl}. |
-| passthrough_request_headers
| typing.List[str]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#passthrough_request_headers AuthBackend#passthrough_request_headers}. |
-| token_type
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#token_type AuthBackend#token_type}. |
+| allowed_response_headers
| typing.List[str]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#allowed_response_headers AuthBackend#allowed_response_headers}. |
+| audit_non_hmac_request_keys
| typing.List[str]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#audit_non_hmac_request_keys AuthBackend#audit_non_hmac_request_keys}. |
+| audit_non_hmac_response_keys
| typing.List[str]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#audit_non_hmac_response_keys AuthBackend#audit_non_hmac_response_keys}. |
+| default_lease_ttl
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#default_lease_ttl AuthBackend#default_lease_ttl}. |
+| listing_visibility
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#listing_visibility AuthBackend#listing_visibility}. |
+| max_lease_ttl
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#max_lease_ttl AuthBackend#max_lease_ttl}. |
+| passthrough_request_headers
| typing.List[str]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#passthrough_request_headers AuthBackend#passthrough_request_headers}. |
+| token_type
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#token_type AuthBackend#token_type}. |
---
@@ -1436,7 +1436,7 @@ allowed_response_headers: typing.List[str]
- *Type:* typing.List[str]
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#allowed_response_headers AuthBackend#allowed_response_headers}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#allowed_response_headers AuthBackend#allowed_response_headers}.
---
@@ -1448,7 +1448,7 @@ audit_non_hmac_request_keys: typing.List[str]
- *Type:* typing.List[str]
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#audit_non_hmac_request_keys AuthBackend#audit_non_hmac_request_keys}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#audit_non_hmac_request_keys AuthBackend#audit_non_hmac_request_keys}.
---
@@ -1460,7 +1460,7 @@ audit_non_hmac_response_keys: typing.List[str]
- *Type:* typing.List[str]
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#audit_non_hmac_response_keys AuthBackend#audit_non_hmac_response_keys}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#audit_non_hmac_response_keys AuthBackend#audit_non_hmac_response_keys}.
---
@@ -1472,7 +1472,7 @@ default_lease_ttl: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#default_lease_ttl AuthBackend#default_lease_ttl}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#default_lease_ttl AuthBackend#default_lease_ttl}.
---
@@ -1484,7 +1484,7 @@ listing_visibility: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#listing_visibility AuthBackend#listing_visibility}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#listing_visibility AuthBackend#listing_visibility}.
---
@@ -1496,7 +1496,7 @@ max_lease_ttl: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#max_lease_ttl AuthBackend#max_lease_ttl}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#max_lease_ttl AuthBackend#max_lease_ttl}.
---
@@ -1508,7 +1508,7 @@ passthrough_request_headers: typing.List[str]
- *Type:* typing.List[str]
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#passthrough_request_headers AuthBackend#passthrough_request_headers}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#passthrough_request_headers AuthBackend#passthrough_request_headers}.
---
@@ -1520,7 +1520,7 @@ token_type: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#token_type AuthBackend#token_type}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#token_type AuthBackend#token_type}.
---
diff --git a/docs/authBackend.typescript.md b/docs/authBackend.typescript.md
index 9f48ce30..80af7659 100644
--- a/docs/authBackend.typescript.md
+++ b/docs/authBackend.typescript.md
@@ -4,7 +4,7 @@
### AuthBackend
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend vault_auth_backend}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend vault_auth_backend}.
#### Initializers
@@ -536,7 +536,7 @@ The construct id used in the generated config for the AuthBackend to import.
The id of the existing AuthBackend that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#import import section} in the documentation of this resource for the id to use
---
@@ -964,12 +964,12 @@ const authBackendConfig: authBackend.AuthBackendConfig = { ... }
| type
| string
| Name of the auth backend. |
| description
| string
| The description of the auth backend. |
| disableRemount
| boolean \| cdktf.IResolvable
| If set, opts out of mount migration on path updates. |
-| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#id AuthBackend#id}. |
+| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#id AuthBackend#id}. |
| identityTokenKey
| string
| The key to use for signing identity tokens. |
| local
| boolean \| cdktf.IResolvable
| Specifies if the auth method is local only. |
| namespace
| string
| Target namespace. (requires Enterprise). |
| path
| string
| path to mount the backend. This defaults to the type. |
-| tune
| cdktf.IResolvable \| AuthBackendTune[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#tune AuthBackend#tune}. |
+| tune
| cdktf.IResolvable \| AuthBackendTune[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#tune AuthBackend#tune}. |
---
@@ -1053,7 +1053,7 @@ public readonly type: string;
Name of the auth backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#type AuthBackend#type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#type AuthBackend#type}
---
@@ -1067,7 +1067,7 @@ public readonly description: string;
The description of the auth backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#description AuthBackend#description}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#description AuthBackend#description}
---
@@ -1081,7 +1081,7 @@ public readonly disableRemount: boolean | IResolvable;
If set, opts out of mount migration on path updates.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#disable_remount AuthBackend#disable_remount}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#disable_remount AuthBackend#disable_remount}
---
@@ -1093,7 +1093,7 @@ public readonly id: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#id AuthBackend#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#id AuthBackend#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1110,7 +1110,7 @@ public readonly identityTokenKey: string;
The key to use for signing identity tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#identity_token_key AuthBackend#identity_token_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#identity_token_key AuthBackend#identity_token_key}
---
@@ -1124,7 +1124,7 @@ public readonly local: boolean | IResolvable;
Specifies if the auth method is local only.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#local AuthBackend#local}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#local AuthBackend#local}
---
@@ -1138,7 +1138,7 @@ public readonly namespace: string;
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#namespace AuthBackend#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#namespace AuthBackend#namespace}
---
@@ -1152,7 +1152,7 @@ public readonly path: string;
path to mount the backend. This defaults to the type.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#path AuthBackend#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#path AuthBackend#path}
---
@@ -1164,7 +1164,7 @@ public readonly tune: IResolvable | AuthBackendTune[];
- *Type:* cdktf.IResolvable | AuthBackendTune[]
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#tune AuthBackend#tune}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#tune AuthBackend#tune}.
---
@@ -1182,14 +1182,14 @@ const authBackendTune: authBackend.AuthBackendTune = { ... }
| **Name** | **Type** | **Description** |
| --- | --- | --- |
-| allowedResponseHeaders
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#allowed_response_headers AuthBackend#allowed_response_headers}. |
-| auditNonHmacRequestKeys
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#audit_non_hmac_request_keys AuthBackend#audit_non_hmac_request_keys}. |
-| auditNonHmacResponseKeys
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#audit_non_hmac_response_keys AuthBackend#audit_non_hmac_response_keys}. |
-| defaultLeaseTtl
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#default_lease_ttl AuthBackend#default_lease_ttl}. |
-| listingVisibility
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#listing_visibility AuthBackend#listing_visibility}. |
-| maxLeaseTtl
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#max_lease_ttl AuthBackend#max_lease_ttl}. |
-| passthroughRequestHeaders
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#passthrough_request_headers AuthBackend#passthrough_request_headers}. |
-| tokenType
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#token_type AuthBackend#token_type}. |
+| allowedResponseHeaders
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#allowed_response_headers AuthBackend#allowed_response_headers}. |
+| auditNonHmacRequestKeys
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#audit_non_hmac_request_keys AuthBackend#audit_non_hmac_request_keys}. |
+| auditNonHmacResponseKeys
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#audit_non_hmac_response_keys AuthBackend#audit_non_hmac_response_keys}. |
+| defaultLeaseTtl
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#default_lease_ttl AuthBackend#default_lease_ttl}. |
+| listingVisibility
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#listing_visibility AuthBackend#listing_visibility}. |
+| maxLeaseTtl
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#max_lease_ttl AuthBackend#max_lease_ttl}. |
+| passthroughRequestHeaders
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#passthrough_request_headers AuthBackend#passthrough_request_headers}. |
+| tokenType
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#token_type AuthBackend#token_type}. |
---
@@ -1201,7 +1201,7 @@ public readonly allowedResponseHeaders: string[];
- *Type:* string[]
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#allowed_response_headers AuthBackend#allowed_response_headers}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#allowed_response_headers AuthBackend#allowed_response_headers}.
---
@@ -1213,7 +1213,7 @@ public readonly auditNonHmacRequestKeys: string[];
- *Type:* string[]
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#audit_non_hmac_request_keys AuthBackend#audit_non_hmac_request_keys}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#audit_non_hmac_request_keys AuthBackend#audit_non_hmac_request_keys}.
---
@@ -1225,7 +1225,7 @@ public readonly auditNonHmacResponseKeys: string[];
- *Type:* string[]
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#audit_non_hmac_response_keys AuthBackend#audit_non_hmac_response_keys}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#audit_non_hmac_response_keys AuthBackend#audit_non_hmac_response_keys}.
---
@@ -1237,7 +1237,7 @@ public readonly defaultLeaseTtl: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#default_lease_ttl AuthBackend#default_lease_ttl}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#default_lease_ttl AuthBackend#default_lease_ttl}.
---
@@ -1249,7 +1249,7 @@ public readonly listingVisibility: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#listing_visibility AuthBackend#listing_visibility}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#listing_visibility AuthBackend#listing_visibility}.
---
@@ -1261,7 +1261,7 @@ public readonly maxLeaseTtl: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#max_lease_ttl AuthBackend#max_lease_ttl}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#max_lease_ttl AuthBackend#max_lease_ttl}.
---
@@ -1273,7 +1273,7 @@ public readonly passthroughRequestHeaders: string[];
- *Type:* string[]
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#passthrough_request_headers AuthBackend#passthrough_request_headers}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#passthrough_request_headers AuthBackend#passthrough_request_headers}.
---
@@ -1285,7 +1285,7 @@ public readonly tokenType: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#token_type AuthBackend#token_type}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#token_type AuthBackend#token_type}.
---
diff --git a/docs/awsAuthBackendCert.csharp.md b/docs/awsAuthBackendCert.csharp.md
index 7d54d947..241a9cef 100644
--- a/docs/awsAuthBackendCert.csharp.md
+++ b/docs/awsAuthBackendCert.csharp.md
@@ -4,7 +4,7 @@
### AwsAuthBackendCert
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert vault_aws_auth_backend_cert}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert vault_aws_auth_backend_cert}.
#### Initializers
@@ -495,7 +495,7 @@ The construct id used in the generated config for the AwsAuthBackendCert to impo
The id of the existing AwsAuthBackendCert that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#import import section} in the documentation of this resource for the id to use
---
@@ -860,7 +860,7 @@ new AwsAuthBackendCertConfig {
| AwsPublicCert
| string
| Base64 encoded AWS Public key required to verify PKCS7 signature of the EC2 instance metadata. |
| CertName
| string
| Name of the certificate to configure. |
| Backend
| string
| Unique name of the auth backend to configure. |
-| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#id AwsAuthBackendCert#id}. |
+| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#id AwsAuthBackendCert#id}. |
| Namespace
| string
| Target namespace. (requires Enterprise). |
| Type
| string
| The type of document that can be verified using the certificate. Must be either "pkcs7" or "identity". |
@@ -946,7 +946,7 @@ public string AwsPublicCert { get; set; }
Base64 encoded AWS Public key required to verify PKCS7 signature of the EC2 instance metadata.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#aws_public_cert AwsAuthBackendCert#aws_public_cert}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#aws_public_cert AwsAuthBackendCert#aws_public_cert}
---
@@ -960,7 +960,7 @@ public string CertName { get; set; }
Name of the certificate to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#cert_name AwsAuthBackendCert#cert_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#cert_name AwsAuthBackendCert#cert_name}
---
@@ -974,7 +974,7 @@ public string Backend { get; set; }
Unique name of the auth backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#backend AwsAuthBackendCert#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#backend AwsAuthBackendCert#backend}
---
@@ -986,7 +986,7 @@ public string Id { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#id AwsAuthBackendCert#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#id AwsAuthBackendCert#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1003,7 +1003,7 @@ public string Namespace { get; set; }
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#namespace AwsAuthBackendCert#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#namespace AwsAuthBackendCert#namespace}
---
@@ -1017,7 +1017,7 @@ public string Type { get; set; }
The type of document that can be verified using the certificate. Must be either "pkcs7" or "identity".
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#type AwsAuthBackendCert#type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#type AwsAuthBackendCert#type}
---
diff --git a/docs/awsAuthBackendCert.go.md b/docs/awsAuthBackendCert.go.md
index 4230be9d..ed206e59 100644
--- a/docs/awsAuthBackendCert.go.md
+++ b/docs/awsAuthBackendCert.go.md
@@ -4,7 +4,7 @@
### AwsAuthBackendCert
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert vault_aws_auth_backend_cert}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert vault_aws_auth_backend_cert}.
#### Initializers
@@ -495,7 +495,7 @@ The construct id used in the generated config for the AwsAuthBackendCert to impo
The id of the existing AwsAuthBackendCert that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#import import section} in the documentation of this resource for the id to use
---
@@ -860,7 +860,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/awsauthbackendcert"
| AwsPublicCert
| *string
| Base64 encoded AWS Public key required to verify PKCS7 signature of the EC2 instance metadata. |
| CertName
| *string
| Name of the certificate to configure. |
| Backend
| *string
| Unique name of the auth backend to configure. |
-| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#id AwsAuthBackendCert#id}. |
+| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#id AwsAuthBackendCert#id}. |
| Namespace
| *string
| Target namespace. (requires Enterprise). |
| Type
| *string
| The type of document that can be verified using the certificate. Must be either "pkcs7" or "identity". |
@@ -946,7 +946,7 @@ AwsPublicCert *string
Base64 encoded AWS Public key required to verify PKCS7 signature of the EC2 instance metadata.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#aws_public_cert AwsAuthBackendCert#aws_public_cert}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#aws_public_cert AwsAuthBackendCert#aws_public_cert}
---
@@ -960,7 +960,7 @@ CertName *string
Name of the certificate to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#cert_name AwsAuthBackendCert#cert_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#cert_name AwsAuthBackendCert#cert_name}
---
@@ -974,7 +974,7 @@ Backend *string
Unique name of the auth backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#backend AwsAuthBackendCert#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#backend AwsAuthBackendCert#backend}
---
@@ -986,7 +986,7 @@ Id *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#id AwsAuthBackendCert#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#id AwsAuthBackendCert#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1003,7 +1003,7 @@ Namespace *string
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#namespace AwsAuthBackendCert#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#namespace AwsAuthBackendCert#namespace}
---
@@ -1017,7 +1017,7 @@ Type *string
The type of document that can be verified using the certificate. Must be either "pkcs7" or "identity".
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#type AwsAuthBackendCert#type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#type AwsAuthBackendCert#type}
---
diff --git a/docs/awsAuthBackendCert.java.md b/docs/awsAuthBackendCert.java.md
index 04d1d487..f6c8a12a 100644
--- a/docs/awsAuthBackendCert.java.md
+++ b/docs/awsAuthBackendCert.java.md
@@ -4,7 +4,7 @@
### AwsAuthBackendCert
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert vault_aws_auth_backend_cert}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert vault_aws_auth_backend_cert}.
#### Initializers
@@ -46,7 +46,7 @@ AwsAuthBackendCert.Builder.create(Construct scope, java.lang.String id)
| awsPublicCert
| java.lang.String
| Base64 encoded AWS Public key required to verify PKCS7 signature of the EC2 instance metadata. |
| certName
| java.lang.String
| Name of the certificate to configure. |
| backend
| java.lang.String
| Unique name of the auth backend to configure. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#id AwsAuthBackendCert#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#id AwsAuthBackendCert#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
| type
| java.lang.String
| The type of document that can be verified using the certificate. Must be either "pkcs7" or "identity". |
@@ -118,7 +118,7 @@ Must be unique amongst siblings in the same scope
Base64 encoded AWS Public key required to verify PKCS7 signature of the EC2 instance metadata.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#aws_public_cert AwsAuthBackendCert#aws_public_cert}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#aws_public_cert AwsAuthBackendCert#aws_public_cert}
---
@@ -128,7 +128,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Name of the certificate to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#cert_name AwsAuthBackendCert#cert_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#cert_name AwsAuthBackendCert#cert_name}
---
@@ -138,7 +138,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Unique name of the auth backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#backend AwsAuthBackendCert#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#backend AwsAuthBackendCert#backend}
---
@@ -146,7 +146,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#id AwsAuthBackendCert#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#id AwsAuthBackendCert#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -159,7 +159,7 @@ If you experience problems setting this value it might not be settable. Please t
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#namespace AwsAuthBackendCert#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#namespace AwsAuthBackendCert#namespace}
---
@@ -169,7 +169,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The type of document that can be verified using the certificate. Must be either "pkcs7" or "identity".
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#type AwsAuthBackendCert#type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#type AwsAuthBackendCert#type}
---
@@ -624,7 +624,7 @@ The construct id used in the generated config for the AwsAuthBackendCert to impo
The id of the existing AwsAuthBackendCert that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#import import section} in the documentation of this resource for the id to use
---
@@ -993,7 +993,7 @@ AwsAuthBackendCertConfig.builder()
| awsPublicCert
| java.lang.String
| Base64 encoded AWS Public key required to verify PKCS7 signature of the EC2 instance metadata. |
| certName
| java.lang.String
| Name of the certificate to configure. |
| backend
| java.lang.String
| Unique name of the auth backend to configure. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#id AwsAuthBackendCert#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#id AwsAuthBackendCert#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
| type
| java.lang.String
| The type of document that can be verified using the certificate. Must be either "pkcs7" or "identity". |
@@ -1079,7 +1079,7 @@ public java.lang.String getAwsPublicCert();
Base64 encoded AWS Public key required to verify PKCS7 signature of the EC2 instance metadata.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#aws_public_cert AwsAuthBackendCert#aws_public_cert}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#aws_public_cert AwsAuthBackendCert#aws_public_cert}
---
@@ -1093,7 +1093,7 @@ public java.lang.String getCertName();
Name of the certificate to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#cert_name AwsAuthBackendCert#cert_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#cert_name AwsAuthBackendCert#cert_name}
---
@@ -1107,7 +1107,7 @@ public java.lang.String getBackend();
Unique name of the auth backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#backend AwsAuthBackendCert#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#backend AwsAuthBackendCert#backend}
---
@@ -1119,7 +1119,7 @@ public java.lang.String getId();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#id AwsAuthBackendCert#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#id AwsAuthBackendCert#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1136,7 +1136,7 @@ public java.lang.String getNamespace();
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#namespace AwsAuthBackendCert#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#namespace AwsAuthBackendCert#namespace}
---
@@ -1150,7 +1150,7 @@ public java.lang.String getType();
The type of document that can be verified using the certificate. Must be either "pkcs7" or "identity".
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#type AwsAuthBackendCert#type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#type AwsAuthBackendCert#type}
---
diff --git a/docs/awsAuthBackendCert.python.md b/docs/awsAuthBackendCert.python.md
index 4e57ac6d..0282bfbb 100644
--- a/docs/awsAuthBackendCert.python.md
+++ b/docs/awsAuthBackendCert.python.md
@@ -4,7 +4,7 @@
### AwsAuthBackendCert
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert vault_aws_auth_backend_cert}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert vault_aws_auth_backend_cert}.
#### Initializers
@@ -44,7 +44,7 @@ awsAuthBackendCert.AwsAuthBackendCert(
| aws_public_cert
| str
| Base64 encoded AWS Public key required to verify PKCS7 signature of the EC2 instance metadata. |
| cert_name
| str
| Name of the certificate to configure. |
| backend
| str
| Unique name of the auth backend to configure. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#id AwsAuthBackendCert#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#id AwsAuthBackendCert#id}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
| type
| str
| The type of document that can be verified using the certificate. Must be either "pkcs7" or "identity". |
@@ -116,7 +116,7 @@ Must be unique amongst siblings in the same scope
Base64 encoded AWS Public key required to verify PKCS7 signature of the EC2 instance metadata.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#aws_public_cert AwsAuthBackendCert#aws_public_cert}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#aws_public_cert AwsAuthBackendCert#aws_public_cert}
---
@@ -126,7 +126,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Name of the certificate to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#cert_name AwsAuthBackendCert#cert_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#cert_name AwsAuthBackendCert#cert_name}
---
@@ -136,7 +136,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Unique name of the auth backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#backend AwsAuthBackendCert#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#backend AwsAuthBackendCert#backend}
---
@@ -144,7 +144,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#id AwsAuthBackendCert#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#id AwsAuthBackendCert#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -157,7 +157,7 @@ If you experience problems setting this value it might not be settable. Please t
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#namespace AwsAuthBackendCert#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#namespace AwsAuthBackendCert#namespace}
---
@@ -167,7 +167,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The type of document that can be verified using the certificate. Must be either "pkcs7" or "identity".
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#type AwsAuthBackendCert#type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#type AwsAuthBackendCert#type}
---
@@ -668,7 +668,7 @@ The construct id used in the generated config for the AwsAuthBackendCert to impo
The id of the existing AwsAuthBackendCert that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#import import section} in the documentation of this resource for the id to use
---
@@ -1033,7 +1033,7 @@ awsAuthBackendCert.AwsAuthBackendCertConfig(
| aws_public_cert
| str
| Base64 encoded AWS Public key required to verify PKCS7 signature of the EC2 instance metadata. |
| cert_name
| str
| Name of the certificate to configure. |
| backend
| str
| Unique name of the auth backend to configure. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#id AwsAuthBackendCert#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#id AwsAuthBackendCert#id}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
| type
| str
| The type of document that can be verified using the certificate. Must be either "pkcs7" or "identity". |
@@ -1119,7 +1119,7 @@ aws_public_cert: str
Base64 encoded AWS Public key required to verify PKCS7 signature of the EC2 instance metadata.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#aws_public_cert AwsAuthBackendCert#aws_public_cert}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#aws_public_cert AwsAuthBackendCert#aws_public_cert}
---
@@ -1133,7 +1133,7 @@ cert_name: str
Name of the certificate to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#cert_name AwsAuthBackendCert#cert_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#cert_name AwsAuthBackendCert#cert_name}
---
@@ -1147,7 +1147,7 @@ backend: str
Unique name of the auth backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#backend AwsAuthBackendCert#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#backend AwsAuthBackendCert#backend}
---
@@ -1159,7 +1159,7 @@ id: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#id AwsAuthBackendCert#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#id AwsAuthBackendCert#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1176,7 +1176,7 @@ namespace: str
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#namespace AwsAuthBackendCert#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#namespace AwsAuthBackendCert#namespace}
---
@@ -1190,7 +1190,7 @@ type: str
The type of document that can be verified using the certificate. Must be either "pkcs7" or "identity".
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#type AwsAuthBackendCert#type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#type AwsAuthBackendCert#type}
---
diff --git a/docs/awsAuthBackendCert.typescript.md b/docs/awsAuthBackendCert.typescript.md
index a8acfc0a..4366b0b1 100644
--- a/docs/awsAuthBackendCert.typescript.md
+++ b/docs/awsAuthBackendCert.typescript.md
@@ -4,7 +4,7 @@
### AwsAuthBackendCert
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert vault_aws_auth_backend_cert}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert vault_aws_auth_backend_cert}.
#### Initializers
@@ -495,7 +495,7 @@ The construct id used in the generated config for the AwsAuthBackendCert to impo
The id of the existing AwsAuthBackendCert that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#import import section} in the documentation of this resource for the id to use
---
@@ -846,7 +846,7 @@ const awsAuthBackendCertConfig: awsAuthBackendCert.AwsAuthBackendCertConfig = {
| awsPublicCert
| string
| Base64 encoded AWS Public key required to verify PKCS7 signature of the EC2 instance metadata. |
| certName
| string
| Name of the certificate to configure. |
| backend
| string
| Unique name of the auth backend to configure. |
-| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#id AwsAuthBackendCert#id}. |
+| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#id AwsAuthBackendCert#id}. |
| namespace
| string
| Target namespace. (requires Enterprise). |
| type
| string
| The type of document that can be verified using the certificate. Must be either "pkcs7" or "identity". |
@@ -932,7 +932,7 @@ public readonly awsPublicCert: string;
Base64 encoded AWS Public key required to verify PKCS7 signature of the EC2 instance metadata.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#aws_public_cert AwsAuthBackendCert#aws_public_cert}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#aws_public_cert AwsAuthBackendCert#aws_public_cert}
---
@@ -946,7 +946,7 @@ public readonly certName: string;
Name of the certificate to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#cert_name AwsAuthBackendCert#cert_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#cert_name AwsAuthBackendCert#cert_name}
---
@@ -960,7 +960,7 @@ public readonly backend: string;
Unique name of the auth backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#backend AwsAuthBackendCert#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#backend AwsAuthBackendCert#backend}
---
@@ -972,7 +972,7 @@ public readonly id: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#id AwsAuthBackendCert#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#id AwsAuthBackendCert#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -989,7 +989,7 @@ public readonly namespace: string;
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#namespace AwsAuthBackendCert#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#namespace AwsAuthBackendCert#namespace}
---
@@ -1003,7 +1003,7 @@ public readonly type: string;
The type of document that can be verified using the certificate. Must be either "pkcs7" or "identity".
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#type AwsAuthBackendCert#type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#type AwsAuthBackendCert#type}
---
diff --git a/docs/awsAuthBackendClient.csharp.md b/docs/awsAuthBackendClient.csharp.md
index a2e7e5d0..91f4ce68 100644
--- a/docs/awsAuthBackendClient.csharp.md
+++ b/docs/awsAuthBackendClient.csharp.md
@@ -4,7 +4,7 @@
### AwsAuthBackendClient
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client vault_aws_auth_backend_client}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client vault_aws_auth_backend_client}.
#### Initializers
@@ -572,7 +572,7 @@ The construct id used in the generated config for the AwsAuthBackendClient to im
The id of the existing AwsAuthBackendClient that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#import import section} in the documentation of this resource for the id to use
---
@@ -1146,7 +1146,7 @@ new AwsAuthBackendClientConfig {
| Ec2Endpoint
| string
| URL to override the default generated endpoint for making AWS EC2 API calls. |
| IamEndpoint
| string
| URL to override the default generated endpoint for making AWS IAM API calls. |
| IamServerIdHeaderValue
| string
| The value to require in the X-Vault-AWS-IAM-Server-ID header as part of GetCallerIdentity requests that are used in the iam auth method. |
-| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#id AwsAuthBackendClient#id}. |
+| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#id AwsAuthBackendClient#id}. |
| IdentityTokenAudience
| string
| The audience claim value. |
| IdentityTokenTtl
| double
| The TTL of generated identity tokens in seconds. |
| MaxRetries
| double
| Number of max retries the client should use for recoverable errors. |
@@ -1239,7 +1239,7 @@ public string AccessKey { get; set; }
AWS Access key with permissions to query AWS APIs.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#access_key AwsAuthBackendClient#access_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#access_key AwsAuthBackendClient#access_key}
---
@@ -1253,7 +1253,7 @@ public string Backend { get; set; }
Unique name of the auth backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#backend AwsAuthBackendClient#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#backend AwsAuthBackendClient#backend}
---
@@ -1267,7 +1267,7 @@ public string Ec2Endpoint { get; set; }
URL to override the default generated endpoint for making AWS EC2 API calls.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#ec2_endpoint AwsAuthBackendClient#ec2_endpoint}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#ec2_endpoint AwsAuthBackendClient#ec2_endpoint}
---
@@ -1281,7 +1281,7 @@ public string IamEndpoint { get; set; }
URL to override the default generated endpoint for making AWS IAM API calls.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#iam_endpoint AwsAuthBackendClient#iam_endpoint}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#iam_endpoint AwsAuthBackendClient#iam_endpoint}
---
@@ -1295,7 +1295,7 @@ public string IamServerIdHeaderValue { get; set; }
The value to require in the X-Vault-AWS-IAM-Server-ID header as part of GetCallerIdentity requests that are used in the iam auth method.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#iam_server_id_header_value AwsAuthBackendClient#iam_server_id_header_value}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#iam_server_id_header_value AwsAuthBackendClient#iam_server_id_header_value}
---
@@ -1307,7 +1307,7 @@ public string Id { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#id AwsAuthBackendClient#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#id AwsAuthBackendClient#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1324,7 +1324,7 @@ public string IdentityTokenAudience { get; set; }
The audience claim value.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#identity_token_audience AwsAuthBackendClient#identity_token_audience}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#identity_token_audience AwsAuthBackendClient#identity_token_audience}
---
@@ -1338,7 +1338,7 @@ public double IdentityTokenTtl { get; set; }
The TTL of generated identity tokens in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#identity_token_ttl AwsAuthBackendClient#identity_token_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#identity_token_ttl AwsAuthBackendClient#identity_token_ttl}
---
@@ -1352,7 +1352,7 @@ public double MaxRetries { get; set; }
Number of max retries the client should use for recoverable errors.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#max_retries AwsAuthBackendClient#max_retries}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#max_retries AwsAuthBackendClient#max_retries}
---
@@ -1366,7 +1366,7 @@ public string Namespace { get; set; }
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#namespace AwsAuthBackendClient#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#namespace AwsAuthBackendClient#namespace}
---
@@ -1380,7 +1380,7 @@ public string RoleArn { get; set; }
Role ARN to assume for plugin identity token federation.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#role_arn AwsAuthBackendClient#role_arn}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#role_arn AwsAuthBackendClient#role_arn}
---
@@ -1394,7 +1394,7 @@ public string SecretKey { get; set; }
AWS Secret key with permissions to query AWS APIs.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#secret_key AwsAuthBackendClient#secret_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#secret_key AwsAuthBackendClient#secret_key}
---
@@ -1408,7 +1408,7 @@ public string StsEndpoint { get; set; }
URL to override the default generated endpoint for making AWS STS API calls.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#sts_endpoint AwsAuthBackendClient#sts_endpoint}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#sts_endpoint AwsAuthBackendClient#sts_endpoint}
---
@@ -1422,7 +1422,7 @@ public string StsRegion { get; set; }
Region to override the default region for making AWS STS API calls.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#sts_region AwsAuthBackendClient#sts_region}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#sts_region AwsAuthBackendClient#sts_region}
---
@@ -1436,7 +1436,7 @@ public object UseStsRegionFromClient { get; set; }
If set, will override sts_region and use the region from the client request's header.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#use_sts_region_from_client AwsAuthBackendClient#use_sts_region_from_client}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#use_sts_region_from_client AwsAuthBackendClient#use_sts_region_from_client}
---
diff --git a/docs/awsAuthBackendClient.go.md b/docs/awsAuthBackendClient.go.md
index 15daa160..c1fd3eac 100644
--- a/docs/awsAuthBackendClient.go.md
+++ b/docs/awsAuthBackendClient.go.md
@@ -4,7 +4,7 @@
### AwsAuthBackendClient
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client vault_aws_auth_backend_client}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client vault_aws_auth_backend_client}.
#### Initializers
@@ -572,7 +572,7 @@ The construct id used in the generated config for the AwsAuthBackendClient to im
The id of the existing AwsAuthBackendClient that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#import import section} in the documentation of this resource for the id to use
---
@@ -1146,7 +1146,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/awsauthbackendclient"
| Ec2Endpoint
| *string
| URL to override the default generated endpoint for making AWS EC2 API calls. |
| IamEndpoint
| *string
| URL to override the default generated endpoint for making AWS IAM API calls. |
| IamServerIdHeaderValue
| *string
| The value to require in the X-Vault-AWS-IAM-Server-ID header as part of GetCallerIdentity requests that are used in the iam auth method. |
-| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#id AwsAuthBackendClient#id}. |
+| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#id AwsAuthBackendClient#id}. |
| IdentityTokenAudience
| *string
| The audience claim value. |
| IdentityTokenTtl
| *f64
| The TTL of generated identity tokens in seconds. |
| MaxRetries
| *f64
| Number of max retries the client should use for recoverable errors. |
@@ -1239,7 +1239,7 @@ AccessKey *string
AWS Access key with permissions to query AWS APIs.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#access_key AwsAuthBackendClient#access_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#access_key AwsAuthBackendClient#access_key}
---
@@ -1253,7 +1253,7 @@ Backend *string
Unique name of the auth backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#backend AwsAuthBackendClient#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#backend AwsAuthBackendClient#backend}
---
@@ -1267,7 +1267,7 @@ Ec2Endpoint *string
URL to override the default generated endpoint for making AWS EC2 API calls.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#ec2_endpoint AwsAuthBackendClient#ec2_endpoint}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#ec2_endpoint AwsAuthBackendClient#ec2_endpoint}
---
@@ -1281,7 +1281,7 @@ IamEndpoint *string
URL to override the default generated endpoint for making AWS IAM API calls.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#iam_endpoint AwsAuthBackendClient#iam_endpoint}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#iam_endpoint AwsAuthBackendClient#iam_endpoint}
---
@@ -1295,7 +1295,7 @@ IamServerIdHeaderValue *string
The value to require in the X-Vault-AWS-IAM-Server-ID header as part of GetCallerIdentity requests that are used in the iam auth method.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#iam_server_id_header_value AwsAuthBackendClient#iam_server_id_header_value}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#iam_server_id_header_value AwsAuthBackendClient#iam_server_id_header_value}
---
@@ -1307,7 +1307,7 @@ Id *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#id AwsAuthBackendClient#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#id AwsAuthBackendClient#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1324,7 +1324,7 @@ IdentityTokenAudience *string
The audience claim value.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#identity_token_audience AwsAuthBackendClient#identity_token_audience}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#identity_token_audience AwsAuthBackendClient#identity_token_audience}
---
@@ -1338,7 +1338,7 @@ IdentityTokenTtl *f64
The TTL of generated identity tokens in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#identity_token_ttl AwsAuthBackendClient#identity_token_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#identity_token_ttl AwsAuthBackendClient#identity_token_ttl}
---
@@ -1352,7 +1352,7 @@ MaxRetries *f64
Number of max retries the client should use for recoverable errors.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#max_retries AwsAuthBackendClient#max_retries}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#max_retries AwsAuthBackendClient#max_retries}
---
@@ -1366,7 +1366,7 @@ Namespace *string
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#namespace AwsAuthBackendClient#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#namespace AwsAuthBackendClient#namespace}
---
@@ -1380,7 +1380,7 @@ RoleArn *string
Role ARN to assume for plugin identity token federation.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#role_arn AwsAuthBackendClient#role_arn}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#role_arn AwsAuthBackendClient#role_arn}
---
@@ -1394,7 +1394,7 @@ SecretKey *string
AWS Secret key with permissions to query AWS APIs.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#secret_key AwsAuthBackendClient#secret_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#secret_key AwsAuthBackendClient#secret_key}
---
@@ -1408,7 +1408,7 @@ StsEndpoint *string
URL to override the default generated endpoint for making AWS STS API calls.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#sts_endpoint AwsAuthBackendClient#sts_endpoint}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#sts_endpoint AwsAuthBackendClient#sts_endpoint}
---
@@ -1422,7 +1422,7 @@ StsRegion *string
Region to override the default region for making AWS STS API calls.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#sts_region AwsAuthBackendClient#sts_region}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#sts_region AwsAuthBackendClient#sts_region}
---
@@ -1436,7 +1436,7 @@ UseStsRegionFromClient interface{}
If set, will override sts_region and use the region from the client request's header.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#use_sts_region_from_client AwsAuthBackendClient#use_sts_region_from_client}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#use_sts_region_from_client AwsAuthBackendClient#use_sts_region_from_client}
---
diff --git a/docs/awsAuthBackendClient.java.md b/docs/awsAuthBackendClient.java.md
index 0bb6a6ec..ef2e8c7f 100644
--- a/docs/awsAuthBackendClient.java.md
+++ b/docs/awsAuthBackendClient.java.md
@@ -4,7 +4,7 @@
### AwsAuthBackendClient
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client vault_aws_auth_backend_client}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client vault_aws_auth_backend_client}.
#### Initializers
@@ -58,7 +58,7 @@ AwsAuthBackendClient.Builder.create(Construct scope, java.lang.String id)
| ec2Endpoint
| java.lang.String
| URL to override the default generated endpoint for making AWS EC2 API calls. |
| iamEndpoint
| java.lang.String
| URL to override the default generated endpoint for making AWS IAM API calls. |
| iamServerIdHeaderValue
| java.lang.String
| The value to require in the X-Vault-AWS-IAM-Server-ID header as part of GetCallerIdentity requests that are used in the iam auth method. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#id AwsAuthBackendClient#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#id AwsAuthBackendClient#id}. |
| identityTokenAudience
| java.lang.String
| The audience claim value. |
| identityTokenTtl
| java.lang.Number
| The TTL of generated identity tokens in seconds. |
| maxRetries
| java.lang.Number
| Number of max retries the client should use for recoverable errors. |
@@ -137,7 +137,7 @@ Must be unique amongst siblings in the same scope
AWS Access key with permissions to query AWS APIs.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#access_key AwsAuthBackendClient#access_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#access_key AwsAuthBackendClient#access_key}
---
@@ -147,7 +147,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Unique name of the auth backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#backend AwsAuthBackendClient#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#backend AwsAuthBackendClient#backend}
---
@@ -157,7 +157,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
URL to override the default generated endpoint for making AWS EC2 API calls.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#ec2_endpoint AwsAuthBackendClient#ec2_endpoint}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#ec2_endpoint AwsAuthBackendClient#ec2_endpoint}
---
@@ -167,7 +167,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
URL to override the default generated endpoint for making AWS IAM API calls.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#iam_endpoint AwsAuthBackendClient#iam_endpoint}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#iam_endpoint AwsAuthBackendClient#iam_endpoint}
---
@@ -177,7 +177,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The value to require in the X-Vault-AWS-IAM-Server-ID header as part of GetCallerIdentity requests that are used in the iam auth method.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#iam_server_id_header_value AwsAuthBackendClient#iam_server_id_header_value}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#iam_server_id_header_value AwsAuthBackendClient#iam_server_id_header_value}
---
@@ -185,7 +185,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#id AwsAuthBackendClient#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#id AwsAuthBackendClient#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -198,7 +198,7 @@ If you experience problems setting this value it might not be settable. Please t
The audience claim value.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#identity_token_audience AwsAuthBackendClient#identity_token_audience}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#identity_token_audience AwsAuthBackendClient#identity_token_audience}
---
@@ -208,7 +208,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The TTL of generated identity tokens in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#identity_token_ttl AwsAuthBackendClient#identity_token_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#identity_token_ttl AwsAuthBackendClient#identity_token_ttl}
---
@@ -218,7 +218,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Number of max retries the client should use for recoverable errors.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#max_retries AwsAuthBackendClient#max_retries}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#max_retries AwsAuthBackendClient#max_retries}
---
@@ -228,7 +228,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#namespace AwsAuthBackendClient#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#namespace AwsAuthBackendClient#namespace}
---
@@ -238,7 +238,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Role ARN to assume for plugin identity token federation.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#role_arn AwsAuthBackendClient#role_arn}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#role_arn AwsAuthBackendClient#role_arn}
---
@@ -248,7 +248,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
AWS Secret key with permissions to query AWS APIs.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#secret_key AwsAuthBackendClient#secret_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#secret_key AwsAuthBackendClient#secret_key}
---
@@ -258,7 +258,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
URL to override the default generated endpoint for making AWS STS API calls.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#sts_endpoint AwsAuthBackendClient#sts_endpoint}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#sts_endpoint AwsAuthBackendClient#sts_endpoint}
---
@@ -268,7 +268,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Region to override the default region for making AWS STS API calls.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#sts_region AwsAuthBackendClient#sts_region}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#sts_region AwsAuthBackendClient#sts_region}
---
@@ -278,7 +278,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
If set, will override sts_region and use the region from the client request's header.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#use_sts_region_from_client AwsAuthBackendClient#use_sts_region_from_client}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#use_sts_region_from_client AwsAuthBackendClient#use_sts_region_from_client}
---
@@ -810,7 +810,7 @@ The construct id used in the generated config for the AwsAuthBackendClient to im
The id of the existing AwsAuthBackendClient that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#import import section} in the documentation of this resource for the id to use
---
@@ -1389,7 +1389,7 @@ AwsAuthBackendClientConfig.builder()
| ec2Endpoint
| java.lang.String
| URL to override the default generated endpoint for making AWS EC2 API calls. |
| iamEndpoint
| java.lang.String
| URL to override the default generated endpoint for making AWS IAM API calls. |
| iamServerIdHeaderValue
| java.lang.String
| The value to require in the X-Vault-AWS-IAM-Server-ID header as part of GetCallerIdentity requests that are used in the iam auth method. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#id AwsAuthBackendClient#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#id AwsAuthBackendClient#id}. |
| identityTokenAudience
| java.lang.String
| The audience claim value. |
| identityTokenTtl
| java.lang.Number
| The TTL of generated identity tokens in seconds. |
| maxRetries
| java.lang.Number
| Number of max retries the client should use for recoverable errors. |
@@ -1482,7 +1482,7 @@ public java.lang.String getAccessKey();
AWS Access key with permissions to query AWS APIs.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#access_key AwsAuthBackendClient#access_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#access_key AwsAuthBackendClient#access_key}
---
@@ -1496,7 +1496,7 @@ public java.lang.String getBackend();
Unique name of the auth backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#backend AwsAuthBackendClient#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#backend AwsAuthBackendClient#backend}
---
@@ -1510,7 +1510,7 @@ public java.lang.String getEc2Endpoint();
URL to override the default generated endpoint for making AWS EC2 API calls.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#ec2_endpoint AwsAuthBackendClient#ec2_endpoint}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#ec2_endpoint AwsAuthBackendClient#ec2_endpoint}
---
@@ -1524,7 +1524,7 @@ public java.lang.String getIamEndpoint();
URL to override the default generated endpoint for making AWS IAM API calls.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#iam_endpoint AwsAuthBackendClient#iam_endpoint}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#iam_endpoint AwsAuthBackendClient#iam_endpoint}
---
@@ -1538,7 +1538,7 @@ public java.lang.String getIamServerIdHeaderValue();
The value to require in the X-Vault-AWS-IAM-Server-ID header as part of GetCallerIdentity requests that are used in the iam auth method.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#iam_server_id_header_value AwsAuthBackendClient#iam_server_id_header_value}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#iam_server_id_header_value AwsAuthBackendClient#iam_server_id_header_value}
---
@@ -1550,7 +1550,7 @@ public java.lang.String getId();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#id AwsAuthBackendClient#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#id AwsAuthBackendClient#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1567,7 +1567,7 @@ public java.lang.String getIdentityTokenAudience();
The audience claim value.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#identity_token_audience AwsAuthBackendClient#identity_token_audience}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#identity_token_audience AwsAuthBackendClient#identity_token_audience}
---
@@ -1581,7 +1581,7 @@ public java.lang.Number getIdentityTokenTtl();
The TTL of generated identity tokens in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#identity_token_ttl AwsAuthBackendClient#identity_token_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#identity_token_ttl AwsAuthBackendClient#identity_token_ttl}
---
@@ -1595,7 +1595,7 @@ public java.lang.Number getMaxRetries();
Number of max retries the client should use for recoverable errors.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#max_retries AwsAuthBackendClient#max_retries}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#max_retries AwsAuthBackendClient#max_retries}
---
@@ -1609,7 +1609,7 @@ public java.lang.String getNamespace();
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#namespace AwsAuthBackendClient#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#namespace AwsAuthBackendClient#namespace}
---
@@ -1623,7 +1623,7 @@ public java.lang.String getRoleArn();
Role ARN to assume for plugin identity token federation.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#role_arn AwsAuthBackendClient#role_arn}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#role_arn AwsAuthBackendClient#role_arn}
---
@@ -1637,7 +1637,7 @@ public java.lang.String getSecretKey();
AWS Secret key with permissions to query AWS APIs.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#secret_key AwsAuthBackendClient#secret_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#secret_key AwsAuthBackendClient#secret_key}
---
@@ -1651,7 +1651,7 @@ public java.lang.String getStsEndpoint();
URL to override the default generated endpoint for making AWS STS API calls.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#sts_endpoint AwsAuthBackendClient#sts_endpoint}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#sts_endpoint AwsAuthBackendClient#sts_endpoint}
---
@@ -1665,7 +1665,7 @@ public java.lang.String getStsRegion();
Region to override the default region for making AWS STS API calls.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#sts_region AwsAuthBackendClient#sts_region}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#sts_region AwsAuthBackendClient#sts_region}
---
@@ -1679,7 +1679,7 @@ public java.lang.Object getUseStsRegionFromClient();
If set, will override sts_region and use the region from the client request's header.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#use_sts_region_from_client AwsAuthBackendClient#use_sts_region_from_client}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#use_sts_region_from_client AwsAuthBackendClient#use_sts_region_from_client}
---
diff --git a/docs/awsAuthBackendClient.python.md b/docs/awsAuthBackendClient.python.md
index 27d05f6d..868c8faf 100644
--- a/docs/awsAuthBackendClient.python.md
+++ b/docs/awsAuthBackendClient.python.md
@@ -4,7 +4,7 @@
### AwsAuthBackendClient
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client vault_aws_auth_backend_client}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client vault_aws_auth_backend_client}.
#### Initializers
@@ -55,7 +55,7 @@ awsAuthBackendClient.AwsAuthBackendClient(
| ec2_endpoint
| str
| URL to override the default generated endpoint for making AWS EC2 API calls. |
| iam_endpoint
| str
| URL to override the default generated endpoint for making AWS IAM API calls. |
| iam_server_id_header_value
| str
| The value to require in the X-Vault-AWS-IAM-Server-ID header as part of GetCallerIdentity requests that are used in the iam auth method. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#id AwsAuthBackendClient#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#id AwsAuthBackendClient#id}. |
| identity_token_audience
| str
| The audience claim value. |
| identity_token_ttl
| typing.Union[int, float]
| The TTL of generated identity tokens in seconds. |
| max_retries
| typing.Union[int, float]
| Number of max retries the client should use for recoverable errors. |
@@ -134,7 +134,7 @@ Must be unique amongst siblings in the same scope
AWS Access key with permissions to query AWS APIs.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#access_key AwsAuthBackendClient#access_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#access_key AwsAuthBackendClient#access_key}
---
@@ -144,7 +144,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Unique name of the auth backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#backend AwsAuthBackendClient#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#backend AwsAuthBackendClient#backend}
---
@@ -154,7 +154,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
URL to override the default generated endpoint for making AWS EC2 API calls.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#ec2_endpoint AwsAuthBackendClient#ec2_endpoint}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#ec2_endpoint AwsAuthBackendClient#ec2_endpoint}
---
@@ -164,7 +164,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
URL to override the default generated endpoint for making AWS IAM API calls.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#iam_endpoint AwsAuthBackendClient#iam_endpoint}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#iam_endpoint AwsAuthBackendClient#iam_endpoint}
---
@@ -174,7 +174,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The value to require in the X-Vault-AWS-IAM-Server-ID header as part of GetCallerIdentity requests that are used in the iam auth method.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#iam_server_id_header_value AwsAuthBackendClient#iam_server_id_header_value}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#iam_server_id_header_value AwsAuthBackendClient#iam_server_id_header_value}
---
@@ -182,7 +182,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#id AwsAuthBackendClient#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#id AwsAuthBackendClient#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -195,7 +195,7 @@ If you experience problems setting this value it might not be settable. Please t
The audience claim value.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#identity_token_audience AwsAuthBackendClient#identity_token_audience}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#identity_token_audience AwsAuthBackendClient#identity_token_audience}
---
@@ -205,7 +205,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The TTL of generated identity tokens in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#identity_token_ttl AwsAuthBackendClient#identity_token_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#identity_token_ttl AwsAuthBackendClient#identity_token_ttl}
---
@@ -215,7 +215,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Number of max retries the client should use for recoverable errors.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#max_retries AwsAuthBackendClient#max_retries}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#max_retries AwsAuthBackendClient#max_retries}
---
@@ -225,7 +225,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#namespace AwsAuthBackendClient#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#namespace AwsAuthBackendClient#namespace}
---
@@ -235,7 +235,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Role ARN to assume for plugin identity token federation.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#role_arn AwsAuthBackendClient#role_arn}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#role_arn AwsAuthBackendClient#role_arn}
---
@@ -245,7 +245,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
AWS Secret key with permissions to query AWS APIs.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#secret_key AwsAuthBackendClient#secret_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#secret_key AwsAuthBackendClient#secret_key}
---
@@ -255,7 +255,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
URL to override the default generated endpoint for making AWS STS API calls.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#sts_endpoint AwsAuthBackendClient#sts_endpoint}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#sts_endpoint AwsAuthBackendClient#sts_endpoint}
---
@@ -265,7 +265,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Region to override the default region for making AWS STS API calls.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#sts_region AwsAuthBackendClient#sts_region}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#sts_region AwsAuthBackendClient#sts_region}
---
@@ -275,7 +275,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
If set, will override sts_region and use the region from the client request's header.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#use_sts_region_from_client AwsAuthBackendClient#use_sts_region_from_client}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#use_sts_region_from_client AwsAuthBackendClient#use_sts_region_from_client}
---
@@ -853,7 +853,7 @@ The construct id used in the generated config for the AwsAuthBackendClient to im
The id of the existing AwsAuthBackendClient that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#import import section} in the documentation of this resource for the id to use
---
@@ -1427,7 +1427,7 @@ awsAuthBackendClient.AwsAuthBackendClientConfig(
| ec2_endpoint
| str
| URL to override the default generated endpoint for making AWS EC2 API calls. |
| iam_endpoint
| str
| URL to override the default generated endpoint for making AWS IAM API calls. |
| iam_server_id_header_value
| str
| The value to require in the X-Vault-AWS-IAM-Server-ID header as part of GetCallerIdentity requests that are used in the iam auth method. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#id AwsAuthBackendClient#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#id AwsAuthBackendClient#id}. |
| identity_token_audience
| str
| The audience claim value. |
| identity_token_ttl
| typing.Union[int, float]
| The TTL of generated identity tokens in seconds. |
| max_retries
| typing.Union[int, float]
| Number of max retries the client should use for recoverable errors. |
@@ -1520,7 +1520,7 @@ access_key: str
AWS Access key with permissions to query AWS APIs.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#access_key AwsAuthBackendClient#access_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#access_key AwsAuthBackendClient#access_key}
---
@@ -1534,7 +1534,7 @@ backend: str
Unique name of the auth backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#backend AwsAuthBackendClient#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#backend AwsAuthBackendClient#backend}
---
@@ -1548,7 +1548,7 @@ ec2_endpoint: str
URL to override the default generated endpoint for making AWS EC2 API calls.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#ec2_endpoint AwsAuthBackendClient#ec2_endpoint}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#ec2_endpoint AwsAuthBackendClient#ec2_endpoint}
---
@@ -1562,7 +1562,7 @@ iam_endpoint: str
URL to override the default generated endpoint for making AWS IAM API calls.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#iam_endpoint AwsAuthBackendClient#iam_endpoint}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#iam_endpoint AwsAuthBackendClient#iam_endpoint}
---
@@ -1576,7 +1576,7 @@ iam_server_id_header_value: str
The value to require in the X-Vault-AWS-IAM-Server-ID header as part of GetCallerIdentity requests that are used in the iam auth method.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#iam_server_id_header_value AwsAuthBackendClient#iam_server_id_header_value}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#iam_server_id_header_value AwsAuthBackendClient#iam_server_id_header_value}
---
@@ -1588,7 +1588,7 @@ id: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#id AwsAuthBackendClient#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#id AwsAuthBackendClient#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1605,7 +1605,7 @@ identity_token_audience: str
The audience claim value.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#identity_token_audience AwsAuthBackendClient#identity_token_audience}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#identity_token_audience AwsAuthBackendClient#identity_token_audience}
---
@@ -1619,7 +1619,7 @@ identity_token_ttl: typing.Union[int, float]
The TTL of generated identity tokens in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#identity_token_ttl AwsAuthBackendClient#identity_token_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#identity_token_ttl AwsAuthBackendClient#identity_token_ttl}
---
@@ -1633,7 +1633,7 @@ max_retries: typing.Union[int, float]
Number of max retries the client should use for recoverable errors.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#max_retries AwsAuthBackendClient#max_retries}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#max_retries AwsAuthBackendClient#max_retries}
---
@@ -1647,7 +1647,7 @@ namespace: str
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#namespace AwsAuthBackendClient#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#namespace AwsAuthBackendClient#namespace}
---
@@ -1661,7 +1661,7 @@ role_arn: str
Role ARN to assume for plugin identity token federation.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#role_arn AwsAuthBackendClient#role_arn}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#role_arn AwsAuthBackendClient#role_arn}
---
@@ -1675,7 +1675,7 @@ secret_key: str
AWS Secret key with permissions to query AWS APIs.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#secret_key AwsAuthBackendClient#secret_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#secret_key AwsAuthBackendClient#secret_key}
---
@@ -1689,7 +1689,7 @@ sts_endpoint: str
URL to override the default generated endpoint for making AWS STS API calls.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#sts_endpoint AwsAuthBackendClient#sts_endpoint}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#sts_endpoint AwsAuthBackendClient#sts_endpoint}
---
@@ -1703,7 +1703,7 @@ sts_region: str
Region to override the default region for making AWS STS API calls.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#sts_region AwsAuthBackendClient#sts_region}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#sts_region AwsAuthBackendClient#sts_region}
---
@@ -1717,7 +1717,7 @@ use_sts_region_from_client: typing.Union[bool, IResolvable]
If set, will override sts_region and use the region from the client request's header.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#use_sts_region_from_client AwsAuthBackendClient#use_sts_region_from_client}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#use_sts_region_from_client AwsAuthBackendClient#use_sts_region_from_client}
---
diff --git a/docs/awsAuthBackendClient.typescript.md b/docs/awsAuthBackendClient.typescript.md
index dde2336c..34b79c80 100644
--- a/docs/awsAuthBackendClient.typescript.md
+++ b/docs/awsAuthBackendClient.typescript.md
@@ -4,7 +4,7 @@
### AwsAuthBackendClient
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client vault_aws_auth_backend_client}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client vault_aws_auth_backend_client}.
#### Initializers
@@ -572,7 +572,7 @@ The construct id used in the generated config for the AwsAuthBackendClient to im
The id of the existing AwsAuthBackendClient that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#import import section} in the documentation of this resource for the id to use
---
@@ -1123,7 +1123,7 @@ const awsAuthBackendClientConfig: awsAuthBackendClient.AwsAuthBackendClientConfi
| ec2Endpoint
| string
| URL to override the default generated endpoint for making AWS EC2 API calls. |
| iamEndpoint
| string
| URL to override the default generated endpoint for making AWS IAM API calls. |
| iamServerIdHeaderValue
| string
| The value to require in the X-Vault-AWS-IAM-Server-ID header as part of GetCallerIdentity requests that are used in the iam auth method. |
-| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#id AwsAuthBackendClient#id}. |
+| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#id AwsAuthBackendClient#id}. |
| identityTokenAudience
| string
| The audience claim value. |
| identityTokenTtl
| number
| The TTL of generated identity tokens in seconds. |
| maxRetries
| number
| Number of max retries the client should use for recoverable errors. |
@@ -1216,7 +1216,7 @@ public readonly accessKey: string;
AWS Access key with permissions to query AWS APIs.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#access_key AwsAuthBackendClient#access_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#access_key AwsAuthBackendClient#access_key}
---
@@ -1230,7 +1230,7 @@ public readonly backend: string;
Unique name of the auth backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#backend AwsAuthBackendClient#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#backend AwsAuthBackendClient#backend}
---
@@ -1244,7 +1244,7 @@ public readonly ec2Endpoint: string;
URL to override the default generated endpoint for making AWS EC2 API calls.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#ec2_endpoint AwsAuthBackendClient#ec2_endpoint}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#ec2_endpoint AwsAuthBackendClient#ec2_endpoint}
---
@@ -1258,7 +1258,7 @@ public readonly iamEndpoint: string;
URL to override the default generated endpoint for making AWS IAM API calls.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#iam_endpoint AwsAuthBackendClient#iam_endpoint}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#iam_endpoint AwsAuthBackendClient#iam_endpoint}
---
@@ -1272,7 +1272,7 @@ public readonly iamServerIdHeaderValue: string;
The value to require in the X-Vault-AWS-IAM-Server-ID header as part of GetCallerIdentity requests that are used in the iam auth method.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#iam_server_id_header_value AwsAuthBackendClient#iam_server_id_header_value}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#iam_server_id_header_value AwsAuthBackendClient#iam_server_id_header_value}
---
@@ -1284,7 +1284,7 @@ public readonly id: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#id AwsAuthBackendClient#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#id AwsAuthBackendClient#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1301,7 +1301,7 @@ public readonly identityTokenAudience: string;
The audience claim value.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#identity_token_audience AwsAuthBackendClient#identity_token_audience}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#identity_token_audience AwsAuthBackendClient#identity_token_audience}
---
@@ -1315,7 +1315,7 @@ public readonly identityTokenTtl: number;
The TTL of generated identity tokens in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#identity_token_ttl AwsAuthBackendClient#identity_token_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#identity_token_ttl AwsAuthBackendClient#identity_token_ttl}
---
@@ -1329,7 +1329,7 @@ public readonly maxRetries: number;
Number of max retries the client should use for recoverable errors.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#max_retries AwsAuthBackendClient#max_retries}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#max_retries AwsAuthBackendClient#max_retries}
---
@@ -1343,7 +1343,7 @@ public readonly namespace: string;
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#namespace AwsAuthBackendClient#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#namespace AwsAuthBackendClient#namespace}
---
@@ -1357,7 +1357,7 @@ public readonly roleArn: string;
Role ARN to assume for plugin identity token federation.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#role_arn AwsAuthBackendClient#role_arn}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#role_arn AwsAuthBackendClient#role_arn}
---
@@ -1371,7 +1371,7 @@ public readonly secretKey: string;
AWS Secret key with permissions to query AWS APIs.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#secret_key AwsAuthBackendClient#secret_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#secret_key AwsAuthBackendClient#secret_key}
---
@@ -1385,7 +1385,7 @@ public readonly stsEndpoint: string;
URL to override the default generated endpoint for making AWS STS API calls.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#sts_endpoint AwsAuthBackendClient#sts_endpoint}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#sts_endpoint AwsAuthBackendClient#sts_endpoint}
---
@@ -1399,7 +1399,7 @@ public readonly stsRegion: string;
Region to override the default region for making AWS STS API calls.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#sts_region AwsAuthBackendClient#sts_region}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#sts_region AwsAuthBackendClient#sts_region}
---
@@ -1413,7 +1413,7 @@ public readonly useStsRegionFromClient: boolean | IResolvable;
If set, will override sts_region and use the region from the client request's header.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#use_sts_region_from_client AwsAuthBackendClient#use_sts_region_from_client}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#use_sts_region_from_client AwsAuthBackendClient#use_sts_region_from_client}
---
diff --git a/docs/awsAuthBackendConfigIdentity.csharp.md b/docs/awsAuthBackendConfigIdentity.csharp.md
index 22bf4e47..81fab49e 100644
--- a/docs/awsAuthBackendConfigIdentity.csharp.md
+++ b/docs/awsAuthBackendConfigIdentity.csharp.md
@@ -4,7 +4,7 @@
### AwsAuthBackendConfigIdentity
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity vault_aws_auth_backend_config_identity}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity vault_aws_auth_backend_config_identity}.
#### Initializers
@@ -516,7 +516,7 @@ The construct id used in the generated config for the AwsAuthBackendConfigIdenti
The id of the existing AwsAuthBackendConfigIdentity that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#import import section} in the documentation of this resource for the id to use
---
@@ -906,7 +906,7 @@ new AwsAuthBackendConfigIdentityConfig {
| Ec2Metadata
| string[]
| The metadata to include on the token returned by the login endpoint. |
| IamAlias
| string
| How to generate the identity alias when using the iam auth method. |
| IamMetadata
| string[]
| The metadata to include on the token returned by the login endpoint. |
-| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#id AwsAuthBackendConfigIdentity#id}. |
+| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#id AwsAuthBackendConfigIdentity#id}. |
| Namespace
| string
| Target namespace. (requires Enterprise). |
---
@@ -991,7 +991,7 @@ public string Backend { get; set; }
Unique name of the auth backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#backend AwsAuthBackendConfigIdentity#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#backend AwsAuthBackendConfigIdentity#backend}
---
@@ -1005,7 +1005,7 @@ public string Ec2Alias { get; set; }
Configures how to generate the identity alias when using the ec2 auth method.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#ec2_alias AwsAuthBackendConfigIdentity#ec2_alias}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#ec2_alias AwsAuthBackendConfigIdentity#ec2_alias}
---
@@ -1019,7 +1019,7 @@ public string[] Ec2Metadata { get; set; }
The metadata to include on the token returned by the login endpoint.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#ec2_metadata AwsAuthBackendConfigIdentity#ec2_metadata}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#ec2_metadata AwsAuthBackendConfigIdentity#ec2_metadata}
---
@@ -1033,7 +1033,7 @@ public string IamAlias { get; set; }
How to generate the identity alias when using the iam auth method.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#iam_alias AwsAuthBackendConfigIdentity#iam_alias}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#iam_alias AwsAuthBackendConfigIdentity#iam_alias}
---
@@ -1047,7 +1047,7 @@ public string[] IamMetadata { get; set; }
The metadata to include on the token returned by the login endpoint.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#iam_metadata AwsAuthBackendConfigIdentity#iam_metadata}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#iam_metadata AwsAuthBackendConfigIdentity#iam_metadata}
---
@@ -1059,7 +1059,7 @@ public string Id { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#id AwsAuthBackendConfigIdentity#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#id AwsAuthBackendConfigIdentity#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1076,7 +1076,7 @@ public string Namespace { get; set; }
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#namespace AwsAuthBackendConfigIdentity#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#namespace AwsAuthBackendConfigIdentity#namespace}
---
diff --git a/docs/awsAuthBackendConfigIdentity.go.md b/docs/awsAuthBackendConfigIdentity.go.md
index faf0ff5b..ce57f965 100644
--- a/docs/awsAuthBackendConfigIdentity.go.md
+++ b/docs/awsAuthBackendConfigIdentity.go.md
@@ -4,7 +4,7 @@
### AwsAuthBackendConfigIdentity
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity vault_aws_auth_backend_config_identity}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity vault_aws_auth_backend_config_identity}.
#### Initializers
@@ -516,7 +516,7 @@ The construct id used in the generated config for the AwsAuthBackendConfigIdenti
The id of the existing AwsAuthBackendConfigIdentity that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#import import section} in the documentation of this resource for the id to use
---
@@ -906,7 +906,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/awsauthbackendconfigi
| Ec2Metadata
| *[]*string
| The metadata to include on the token returned by the login endpoint. |
| IamAlias
| *string
| How to generate the identity alias when using the iam auth method. |
| IamMetadata
| *[]*string
| The metadata to include on the token returned by the login endpoint. |
-| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#id AwsAuthBackendConfigIdentity#id}. |
+| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#id AwsAuthBackendConfigIdentity#id}. |
| Namespace
| *string
| Target namespace. (requires Enterprise). |
---
@@ -991,7 +991,7 @@ Backend *string
Unique name of the auth backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#backend AwsAuthBackendConfigIdentity#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#backend AwsAuthBackendConfigIdentity#backend}
---
@@ -1005,7 +1005,7 @@ Ec2Alias *string
Configures how to generate the identity alias when using the ec2 auth method.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#ec2_alias AwsAuthBackendConfigIdentity#ec2_alias}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#ec2_alias AwsAuthBackendConfigIdentity#ec2_alias}
---
@@ -1019,7 +1019,7 @@ Ec2Metadata *[]*string
The metadata to include on the token returned by the login endpoint.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#ec2_metadata AwsAuthBackendConfigIdentity#ec2_metadata}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#ec2_metadata AwsAuthBackendConfigIdentity#ec2_metadata}
---
@@ -1033,7 +1033,7 @@ IamAlias *string
How to generate the identity alias when using the iam auth method.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#iam_alias AwsAuthBackendConfigIdentity#iam_alias}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#iam_alias AwsAuthBackendConfigIdentity#iam_alias}
---
@@ -1047,7 +1047,7 @@ IamMetadata *[]*string
The metadata to include on the token returned by the login endpoint.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#iam_metadata AwsAuthBackendConfigIdentity#iam_metadata}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#iam_metadata AwsAuthBackendConfigIdentity#iam_metadata}
---
@@ -1059,7 +1059,7 @@ Id *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#id AwsAuthBackendConfigIdentity#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#id AwsAuthBackendConfigIdentity#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1076,7 +1076,7 @@ Namespace *string
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#namespace AwsAuthBackendConfigIdentity#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#namespace AwsAuthBackendConfigIdentity#namespace}
---
diff --git a/docs/awsAuthBackendConfigIdentity.java.md b/docs/awsAuthBackendConfigIdentity.java.md
index 144837ff..a97d7fd7 100644
--- a/docs/awsAuthBackendConfigIdentity.java.md
+++ b/docs/awsAuthBackendConfigIdentity.java.md
@@ -4,7 +4,7 @@
### AwsAuthBackendConfigIdentity
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity vault_aws_auth_backend_config_identity}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity vault_aws_auth_backend_config_identity}.
#### Initializers
@@ -49,7 +49,7 @@ AwsAuthBackendConfigIdentity.Builder.create(Construct scope, java.lang.String id
| ec2Metadata
| java.util.List
| The metadata to include on the token returned by the login endpoint. |
| iamAlias
| java.lang.String
| How to generate the identity alias when using the iam auth method. |
| iamMetadata
| java.util.List
| The metadata to include on the token returned by the login endpoint. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#id AwsAuthBackendConfigIdentity#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#id AwsAuthBackendConfigIdentity#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
---
@@ -120,7 +120,7 @@ Must be unique amongst siblings in the same scope
Unique name of the auth backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#backend AwsAuthBackendConfigIdentity#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#backend AwsAuthBackendConfigIdentity#backend}
---
@@ -130,7 +130,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Configures how to generate the identity alias when using the ec2 auth method.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#ec2_alias AwsAuthBackendConfigIdentity#ec2_alias}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#ec2_alias AwsAuthBackendConfigIdentity#ec2_alias}
---
@@ -140,7 +140,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The metadata to include on the token returned by the login endpoint.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#ec2_metadata AwsAuthBackendConfigIdentity#ec2_metadata}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#ec2_metadata AwsAuthBackendConfigIdentity#ec2_metadata}
---
@@ -150,7 +150,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
How to generate the identity alias when using the iam auth method.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#iam_alias AwsAuthBackendConfigIdentity#iam_alias}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#iam_alias AwsAuthBackendConfigIdentity#iam_alias}
---
@@ -160,7 +160,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The metadata to include on the token returned by the login endpoint.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#iam_metadata AwsAuthBackendConfigIdentity#iam_metadata}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#iam_metadata AwsAuthBackendConfigIdentity#iam_metadata}
---
@@ -168,7 +168,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#id AwsAuthBackendConfigIdentity#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#id AwsAuthBackendConfigIdentity#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -181,7 +181,7 @@ If you experience problems setting this value it might not be settable. Please t
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#namespace AwsAuthBackendConfigIdentity#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#namespace AwsAuthBackendConfigIdentity#namespace}
---
@@ -657,7 +657,7 @@ The construct id used in the generated config for the AwsAuthBackendConfigIdenti
The id of the existing AwsAuthBackendConfigIdentity that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#import import section} in the documentation of this resource for the id to use
---
@@ -1051,7 +1051,7 @@ AwsAuthBackendConfigIdentityConfig.builder()
| ec2Metadata
| java.util.List
| The metadata to include on the token returned by the login endpoint. |
| iamAlias
| java.lang.String
| How to generate the identity alias when using the iam auth method. |
| iamMetadata
| java.util.List
| The metadata to include on the token returned by the login endpoint. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#id AwsAuthBackendConfigIdentity#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#id AwsAuthBackendConfigIdentity#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
---
@@ -1136,7 +1136,7 @@ public java.lang.String getBackend();
Unique name of the auth backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#backend AwsAuthBackendConfigIdentity#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#backend AwsAuthBackendConfigIdentity#backend}
---
@@ -1150,7 +1150,7 @@ public java.lang.String getEc2Alias();
Configures how to generate the identity alias when using the ec2 auth method.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#ec2_alias AwsAuthBackendConfigIdentity#ec2_alias}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#ec2_alias AwsAuthBackendConfigIdentity#ec2_alias}
---
@@ -1164,7 +1164,7 @@ public java.util.List getEc2Metadata();
The metadata to include on the token returned by the login endpoint.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#ec2_metadata AwsAuthBackendConfigIdentity#ec2_metadata}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#ec2_metadata AwsAuthBackendConfigIdentity#ec2_metadata}
---
@@ -1178,7 +1178,7 @@ public java.lang.String getIamAlias();
How to generate the identity alias when using the iam auth method.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#iam_alias AwsAuthBackendConfigIdentity#iam_alias}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#iam_alias AwsAuthBackendConfigIdentity#iam_alias}
---
@@ -1192,7 +1192,7 @@ public java.util.List getIamMetadata();
The metadata to include on the token returned by the login endpoint.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#iam_metadata AwsAuthBackendConfigIdentity#iam_metadata}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#iam_metadata AwsAuthBackendConfigIdentity#iam_metadata}
---
@@ -1204,7 +1204,7 @@ public java.lang.String getId();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#id AwsAuthBackendConfigIdentity#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#id AwsAuthBackendConfigIdentity#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1221,7 +1221,7 @@ public java.lang.String getNamespace();
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#namespace AwsAuthBackendConfigIdentity#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#namespace AwsAuthBackendConfigIdentity#namespace}
---
diff --git a/docs/awsAuthBackendConfigIdentity.python.md b/docs/awsAuthBackendConfigIdentity.python.md
index 414f4887..b131cfcb 100644
--- a/docs/awsAuthBackendConfigIdentity.python.md
+++ b/docs/awsAuthBackendConfigIdentity.python.md
@@ -4,7 +4,7 @@
### AwsAuthBackendConfigIdentity
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity vault_aws_auth_backend_config_identity}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity vault_aws_auth_backend_config_identity}.
#### Initializers
@@ -47,7 +47,7 @@ awsAuthBackendConfigIdentity.AwsAuthBackendConfigIdentity(
| ec2_metadata
| typing.List[str]
| The metadata to include on the token returned by the login endpoint. |
| iam_alias
| str
| How to generate the identity alias when using the iam auth method. |
| iam_metadata
| typing.List[str]
| The metadata to include on the token returned by the login endpoint. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#id AwsAuthBackendConfigIdentity#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#id AwsAuthBackendConfigIdentity#id}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
---
@@ -118,7 +118,7 @@ Must be unique amongst siblings in the same scope
Unique name of the auth backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#backend AwsAuthBackendConfigIdentity#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#backend AwsAuthBackendConfigIdentity#backend}
---
@@ -128,7 +128,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Configures how to generate the identity alias when using the ec2 auth method.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#ec2_alias AwsAuthBackendConfigIdentity#ec2_alias}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#ec2_alias AwsAuthBackendConfigIdentity#ec2_alias}
---
@@ -138,7 +138,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The metadata to include on the token returned by the login endpoint.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#ec2_metadata AwsAuthBackendConfigIdentity#ec2_metadata}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#ec2_metadata AwsAuthBackendConfigIdentity#ec2_metadata}
---
@@ -148,7 +148,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
How to generate the identity alias when using the iam auth method.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#iam_alias AwsAuthBackendConfigIdentity#iam_alias}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#iam_alias AwsAuthBackendConfigIdentity#iam_alias}
---
@@ -158,7 +158,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The metadata to include on the token returned by the login endpoint.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#iam_metadata AwsAuthBackendConfigIdentity#iam_metadata}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#iam_metadata AwsAuthBackendConfigIdentity#iam_metadata}
---
@@ -166,7 +166,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#id AwsAuthBackendConfigIdentity#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#id AwsAuthBackendConfigIdentity#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -179,7 +179,7 @@ If you experience problems setting this value it might not be settable. Please t
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#namespace AwsAuthBackendConfigIdentity#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#namespace AwsAuthBackendConfigIdentity#namespace}
---
@@ -701,7 +701,7 @@ The construct id used in the generated config for the AwsAuthBackendConfigIdenti
The id of the existing AwsAuthBackendConfigIdentity that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#import import section} in the documentation of this resource for the id to use
---
@@ -1091,7 +1091,7 @@ awsAuthBackendConfigIdentity.AwsAuthBackendConfigIdentityConfig(
| ec2_metadata
| typing.List[str]
| The metadata to include on the token returned by the login endpoint. |
| iam_alias
| str
| How to generate the identity alias when using the iam auth method. |
| iam_metadata
| typing.List[str]
| The metadata to include on the token returned by the login endpoint. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#id AwsAuthBackendConfigIdentity#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#id AwsAuthBackendConfigIdentity#id}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
---
@@ -1176,7 +1176,7 @@ backend: str
Unique name of the auth backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#backend AwsAuthBackendConfigIdentity#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#backend AwsAuthBackendConfigIdentity#backend}
---
@@ -1190,7 +1190,7 @@ ec2_alias: str
Configures how to generate the identity alias when using the ec2 auth method.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#ec2_alias AwsAuthBackendConfigIdentity#ec2_alias}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#ec2_alias AwsAuthBackendConfigIdentity#ec2_alias}
---
@@ -1204,7 +1204,7 @@ ec2_metadata: typing.List[str]
The metadata to include on the token returned by the login endpoint.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#ec2_metadata AwsAuthBackendConfigIdentity#ec2_metadata}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#ec2_metadata AwsAuthBackendConfigIdentity#ec2_metadata}
---
@@ -1218,7 +1218,7 @@ iam_alias: str
How to generate the identity alias when using the iam auth method.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#iam_alias AwsAuthBackendConfigIdentity#iam_alias}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#iam_alias AwsAuthBackendConfigIdentity#iam_alias}
---
@@ -1232,7 +1232,7 @@ iam_metadata: typing.List[str]
The metadata to include on the token returned by the login endpoint.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#iam_metadata AwsAuthBackendConfigIdentity#iam_metadata}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#iam_metadata AwsAuthBackendConfigIdentity#iam_metadata}
---
@@ -1244,7 +1244,7 @@ id: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#id AwsAuthBackendConfigIdentity#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#id AwsAuthBackendConfigIdentity#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1261,7 +1261,7 @@ namespace: str
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#namespace AwsAuthBackendConfigIdentity#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#namespace AwsAuthBackendConfigIdentity#namespace}
---
diff --git a/docs/awsAuthBackendConfigIdentity.typescript.md b/docs/awsAuthBackendConfigIdentity.typescript.md
index 77ebb4cd..47ec49b4 100644
--- a/docs/awsAuthBackendConfigIdentity.typescript.md
+++ b/docs/awsAuthBackendConfigIdentity.typescript.md
@@ -4,7 +4,7 @@
### AwsAuthBackendConfigIdentity
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity vault_aws_auth_backend_config_identity}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity vault_aws_auth_backend_config_identity}.
#### Initializers
@@ -516,7 +516,7 @@ The construct id used in the generated config for the AwsAuthBackendConfigIdenti
The id of the existing AwsAuthBackendConfigIdentity that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#import import section} in the documentation of this resource for the id to use
---
@@ -891,7 +891,7 @@ const awsAuthBackendConfigIdentityConfig: awsAuthBackendConfigIdentity.AwsAuthBa
| ec2Metadata
| string[]
| The metadata to include on the token returned by the login endpoint. |
| iamAlias
| string
| How to generate the identity alias when using the iam auth method. |
| iamMetadata
| string[]
| The metadata to include on the token returned by the login endpoint. |
-| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#id AwsAuthBackendConfigIdentity#id}. |
+| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#id AwsAuthBackendConfigIdentity#id}. |
| namespace
| string
| Target namespace. (requires Enterprise). |
---
@@ -976,7 +976,7 @@ public readonly backend: string;
Unique name of the auth backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#backend AwsAuthBackendConfigIdentity#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#backend AwsAuthBackendConfigIdentity#backend}
---
@@ -990,7 +990,7 @@ public readonly ec2Alias: string;
Configures how to generate the identity alias when using the ec2 auth method.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#ec2_alias AwsAuthBackendConfigIdentity#ec2_alias}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#ec2_alias AwsAuthBackendConfigIdentity#ec2_alias}
---
@@ -1004,7 +1004,7 @@ public readonly ec2Metadata: string[];
The metadata to include on the token returned by the login endpoint.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#ec2_metadata AwsAuthBackendConfigIdentity#ec2_metadata}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#ec2_metadata AwsAuthBackendConfigIdentity#ec2_metadata}
---
@@ -1018,7 +1018,7 @@ public readonly iamAlias: string;
How to generate the identity alias when using the iam auth method.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#iam_alias AwsAuthBackendConfigIdentity#iam_alias}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#iam_alias AwsAuthBackendConfigIdentity#iam_alias}
---
@@ -1032,7 +1032,7 @@ public readonly iamMetadata: string[];
The metadata to include on the token returned by the login endpoint.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#iam_metadata AwsAuthBackendConfigIdentity#iam_metadata}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#iam_metadata AwsAuthBackendConfigIdentity#iam_metadata}
---
@@ -1044,7 +1044,7 @@ public readonly id: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#id AwsAuthBackendConfigIdentity#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#id AwsAuthBackendConfigIdentity#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1061,7 +1061,7 @@ public readonly namespace: string;
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#namespace AwsAuthBackendConfigIdentity#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#namespace AwsAuthBackendConfigIdentity#namespace}
---
diff --git a/docs/awsAuthBackendIdentityWhitelist.csharp.md b/docs/awsAuthBackendIdentityWhitelist.csharp.md
index bff85ae1..bb9c78b0 100644
--- a/docs/awsAuthBackendIdentityWhitelist.csharp.md
+++ b/docs/awsAuthBackendIdentityWhitelist.csharp.md
@@ -4,7 +4,7 @@
### AwsAuthBackendIdentityWhitelist
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_identity_whitelist vault_aws_auth_backend_identity_whitelist}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_identity_whitelist vault_aws_auth_backend_identity_whitelist}.
#### Initializers
@@ -502,7 +502,7 @@ The construct id used in the generated config for the AwsAuthBackendIdentityWhit
The id of the existing AwsAuthBackendIdentityWhitelist that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_identity_whitelist#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_identity_whitelist#import import section} in the documentation of this resource for the id to use
---
@@ -843,7 +843,7 @@ new AwsAuthBackendIdentityWhitelistConfig {
| Provisioners
| object[]
| *No description.* |
| Backend
| string
| Unique name of the auth backend to configure. |
| DisablePeriodicTidy
| object
| If true, disables the periodic tidying of the identiy whitelist entries. |
-| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_identity_whitelist#id AwsAuthBackendIdentityWhitelist#id}. |
+| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_identity_whitelist#id AwsAuthBackendIdentityWhitelist#id}. |
| Namespace
| string
| Target namespace. (requires Enterprise). |
| SafetyBuffer
| double
| The amount of extra time that must have passed beyond the roletag expiration, before it's removed from backend storage. |
@@ -929,7 +929,7 @@ public string Backend { get; set; }
Unique name of the auth backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_identity_whitelist#backend AwsAuthBackendIdentityWhitelist#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_identity_whitelist#backend AwsAuthBackendIdentityWhitelist#backend}
---
@@ -943,7 +943,7 @@ public object DisablePeriodicTidy { get; set; }
If true, disables the periodic tidying of the identiy whitelist entries.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_identity_whitelist#disable_periodic_tidy AwsAuthBackendIdentityWhitelist#disable_periodic_tidy}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_identity_whitelist#disable_periodic_tidy AwsAuthBackendIdentityWhitelist#disable_periodic_tidy}
---
@@ -955,7 +955,7 @@ public string Id { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_identity_whitelist#id AwsAuthBackendIdentityWhitelist#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_identity_whitelist#id AwsAuthBackendIdentityWhitelist#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -972,7 +972,7 @@ public string Namespace { get; set; }
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_identity_whitelist#namespace AwsAuthBackendIdentityWhitelist#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_identity_whitelist#namespace AwsAuthBackendIdentityWhitelist#namespace}
---
@@ -986,7 +986,7 @@ public double SafetyBuffer { get; set; }
The amount of extra time that must have passed beyond the roletag expiration, before it's removed from backend storage.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_identity_whitelist#safety_buffer AwsAuthBackendIdentityWhitelist#safety_buffer}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_identity_whitelist#safety_buffer AwsAuthBackendIdentityWhitelist#safety_buffer}
---
diff --git a/docs/awsAuthBackendIdentityWhitelist.go.md b/docs/awsAuthBackendIdentityWhitelist.go.md
index ed3c9c0b..77d6f939 100644
--- a/docs/awsAuthBackendIdentityWhitelist.go.md
+++ b/docs/awsAuthBackendIdentityWhitelist.go.md
@@ -4,7 +4,7 @@
### AwsAuthBackendIdentityWhitelist
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_identity_whitelist vault_aws_auth_backend_identity_whitelist}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_identity_whitelist vault_aws_auth_backend_identity_whitelist}.
#### Initializers
@@ -502,7 +502,7 @@ The construct id used in the generated config for the AwsAuthBackendIdentityWhit
The id of the existing AwsAuthBackendIdentityWhitelist that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_identity_whitelist#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_identity_whitelist#import import section} in the documentation of this resource for the id to use
---
@@ -843,7 +843,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/awsauthbackendidentit
| Provisioners
| *[]interface{}
| *No description.* |
| Backend
| *string
| Unique name of the auth backend to configure. |
| DisablePeriodicTidy
| interface{}
| If true, disables the periodic tidying of the identiy whitelist entries. |
-| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_identity_whitelist#id AwsAuthBackendIdentityWhitelist#id}. |
+| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_identity_whitelist#id AwsAuthBackendIdentityWhitelist#id}. |
| Namespace
| *string
| Target namespace. (requires Enterprise). |
| SafetyBuffer
| *f64
| The amount of extra time that must have passed beyond the roletag expiration, before it's removed from backend storage. |
@@ -929,7 +929,7 @@ Backend *string
Unique name of the auth backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_identity_whitelist#backend AwsAuthBackendIdentityWhitelist#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_identity_whitelist#backend AwsAuthBackendIdentityWhitelist#backend}
---
@@ -943,7 +943,7 @@ DisablePeriodicTidy interface{}
If true, disables the periodic tidying of the identiy whitelist entries.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_identity_whitelist#disable_periodic_tidy AwsAuthBackendIdentityWhitelist#disable_periodic_tidy}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_identity_whitelist#disable_periodic_tidy AwsAuthBackendIdentityWhitelist#disable_periodic_tidy}
---
@@ -955,7 +955,7 @@ Id *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_identity_whitelist#id AwsAuthBackendIdentityWhitelist#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_identity_whitelist#id AwsAuthBackendIdentityWhitelist#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -972,7 +972,7 @@ Namespace *string
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_identity_whitelist#namespace AwsAuthBackendIdentityWhitelist#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_identity_whitelist#namespace AwsAuthBackendIdentityWhitelist#namespace}
---
@@ -986,7 +986,7 @@ SafetyBuffer *f64
The amount of extra time that must have passed beyond the roletag expiration, before it's removed from backend storage.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_identity_whitelist#safety_buffer AwsAuthBackendIdentityWhitelist#safety_buffer}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_identity_whitelist#safety_buffer AwsAuthBackendIdentityWhitelist#safety_buffer}
---
diff --git a/docs/awsAuthBackendIdentityWhitelist.java.md b/docs/awsAuthBackendIdentityWhitelist.java.md
index 5c8cc940..fbc8e3aa 100644
--- a/docs/awsAuthBackendIdentityWhitelist.java.md
+++ b/docs/awsAuthBackendIdentityWhitelist.java.md
@@ -4,7 +4,7 @@
### AwsAuthBackendIdentityWhitelist
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_identity_whitelist vault_aws_auth_backend_identity_whitelist}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_identity_whitelist vault_aws_auth_backend_identity_whitelist}.
#### Initializers
@@ -45,7 +45,7 @@ AwsAuthBackendIdentityWhitelist.Builder.create(Construct scope, java.lang.String
| provisioners
| java.util.List
| *No description.* |
| backend
| java.lang.String
| Unique name of the auth backend to configure. |
| disablePeriodicTidy
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| If true, disables the periodic tidying of the identiy whitelist entries. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_identity_whitelist#id AwsAuthBackendIdentityWhitelist#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_identity_whitelist#id AwsAuthBackendIdentityWhitelist#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
| safetyBuffer
| java.lang.Number
| The amount of extra time that must have passed beyond the roletag expiration, before it's removed from backend storage. |
@@ -117,7 +117,7 @@ Must be unique amongst siblings in the same scope
Unique name of the auth backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_identity_whitelist#backend AwsAuthBackendIdentityWhitelist#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_identity_whitelist#backend AwsAuthBackendIdentityWhitelist#backend}
---
@@ -127,7 +127,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
If true, disables the periodic tidying of the identiy whitelist entries.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_identity_whitelist#disable_periodic_tidy AwsAuthBackendIdentityWhitelist#disable_periodic_tidy}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_identity_whitelist#disable_periodic_tidy AwsAuthBackendIdentityWhitelist#disable_periodic_tidy}
---
@@ -135,7 +135,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_identity_whitelist#id AwsAuthBackendIdentityWhitelist#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_identity_whitelist#id AwsAuthBackendIdentityWhitelist#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -148,7 +148,7 @@ If you experience problems setting this value it might not be settable. Please t
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_identity_whitelist#namespace AwsAuthBackendIdentityWhitelist#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_identity_whitelist#namespace AwsAuthBackendIdentityWhitelist#namespace}
---
@@ -158,7 +158,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The amount of extra time that must have passed beyond the roletag expiration, before it's removed from backend storage.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_identity_whitelist#safety_buffer AwsAuthBackendIdentityWhitelist#safety_buffer}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_identity_whitelist#safety_buffer AwsAuthBackendIdentityWhitelist#safety_buffer}
---
@@ -620,7 +620,7 @@ The construct id used in the generated config for the AwsAuthBackendIdentityWhit
The id of the existing AwsAuthBackendIdentityWhitelist that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_identity_whitelist#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_identity_whitelist#import import section} in the documentation of this resource for the id to use
---
@@ -966,7 +966,7 @@ AwsAuthBackendIdentityWhitelistConfig.builder()
| provisioners
| java.util.List
| *No description.* |
| backend
| java.lang.String
| Unique name of the auth backend to configure. |
| disablePeriodicTidy
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| If true, disables the periodic tidying of the identiy whitelist entries. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_identity_whitelist#id AwsAuthBackendIdentityWhitelist#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_identity_whitelist#id AwsAuthBackendIdentityWhitelist#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
| safetyBuffer
| java.lang.Number
| The amount of extra time that must have passed beyond the roletag expiration, before it's removed from backend storage. |
@@ -1052,7 +1052,7 @@ public java.lang.String getBackend();
Unique name of the auth backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_identity_whitelist#backend AwsAuthBackendIdentityWhitelist#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_identity_whitelist#backend AwsAuthBackendIdentityWhitelist#backend}
---
@@ -1066,7 +1066,7 @@ public java.lang.Object getDisablePeriodicTidy();
If true, disables the periodic tidying of the identiy whitelist entries.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_identity_whitelist#disable_periodic_tidy AwsAuthBackendIdentityWhitelist#disable_periodic_tidy}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_identity_whitelist#disable_periodic_tidy AwsAuthBackendIdentityWhitelist#disable_periodic_tidy}
---
@@ -1078,7 +1078,7 @@ public java.lang.String getId();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_identity_whitelist#id AwsAuthBackendIdentityWhitelist#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_identity_whitelist#id AwsAuthBackendIdentityWhitelist#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1095,7 +1095,7 @@ public java.lang.String getNamespace();
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_identity_whitelist#namespace AwsAuthBackendIdentityWhitelist#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_identity_whitelist#namespace AwsAuthBackendIdentityWhitelist#namespace}
---
@@ -1109,7 +1109,7 @@ public java.lang.Number getSafetyBuffer();
The amount of extra time that must have passed beyond the roletag expiration, before it's removed from backend storage.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_identity_whitelist#safety_buffer AwsAuthBackendIdentityWhitelist#safety_buffer}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_identity_whitelist#safety_buffer AwsAuthBackendIdentityWhitelist#safety_buffer}
---
diff --git a/docs/awsAuthBackendIdentityWhitelist.python.md b/docs/awsAuthBackendIdentityWhitelist.python.md
index ddee13d2..fa952275 100644
--- a/docs/awsAuthBackendIdentityWhitelist.python.md
+++ b/docs/awsAuthBackendIdentityWhitelist.python.md
@@ -4,7 +4,7 @@
### AwsAuthBackendIdentityWhitelist
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_identity_whitelist vault_aws_auth_backend_identity_whitelist}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_identity_whitelist vault_aws_auth_backend_identity_whitelist}.
#### Initializers
@@ -42,7 +42,7 @@ awsAuthBackendIdentityWhitelist.AwsAuthBackendIdentityWhitelist(
| provisioners
| typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]]
| *No description.* |
| backend
| str
| Unique name of the auth backend to configure. |
| disable_periodic_tidy
| typing.Union[bool, cdktf.IResolvable]
| If true, disables the periodic tidying of the identiy whitelist entries. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_identity_whitelist#id AwsAuthBackendIdentityWhitelist#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_identity_whitelist#id AwsAuthBackendIdentityWhitelist#id}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
| safety_buffer
| typing.Union[int, float]
| The amount of extra time that must have passed beyond the roletag expiration, before it's removed from backend storage. |
@@ -114,7 +114,7 @@ Must be unique amongst siblings in the same scope
Unique name of the auth backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_identity_whitelist#backend AwsAuthBackendIdentityWhitelist#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_identity_whitelist#backend AwsAuthBackendIdentityWhitelist#backend}
---
@@ -124,7 +124,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
If true, disables the periodic tidying of the identiy whitelist entries.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_identity_whitelist#disable_periodic_tidy AwsAuthBackendIdentityWhitelist#disable_periodic_tidy}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_identity_whitelist#disable_periodic_tidy AwsAuthBackendIdentityWhitelist#disable_periodic_tidy}
---
@@ -132,7 +132,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_identity_whitelist#id AwsAuthBackendIdentityWhitelist#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_identity_whitelist#id AwsAuthBackendIdentityWhitelist#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -145,7 +145,7 @@ If you experience problems setting this value it might not be settable. Please t
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_identity_whitelist#namespace AwsAuthBackendIdentityWhitelist#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_identity_whitelist#namespace AwsAuthBackendIdentityWhitelist#namespace}
---
@@ -155,7 +155,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The amount of extra time that must have passed beyond the roletag expiration, before it's removed from backend storage.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_identity_whitelist#safety_buffer AwsAuthBackendIdentityWhitelist#safety_buffer}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_identity_whitelist#safety_buffer AwsAuthBackendIdentityWhitelist#safety_buffer}
---
@@ -663,7 +663,7 @@ The construct id used in the generated config for the AwsAuthBackendIdentityWhit
The id of the existing AwsAuthBackendIdentityWhitelist that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_identity_whitelist#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_identity_whitelist#import import section} in the documentation of this resource for the id to use
---
@@ -1004,7 +1004,7 @@ awsAuthBackendIdentityWhitelist.AwsAuthBackendIdentityWhitelistConfig(
| provisioners
| typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]]
| *No description.* |
| backend
| str
| Unique name of the auth backend to configure. |
| disable_periodic_tidy
| typing.Union[bool, cdktf.IResolvable]
| If true, disables the periodic tidying of the identiy whitelist entries. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_identity_whitelist#id AwsAuthBackendIdentityWhitelist#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_identity_whitelist#id AwsAuthBackendIdentityWhitelist#id}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
| safety_buffer
| typing.Union[int, float]
| The amount of extra time that must have passed beyond the roletag expiration, before it's removed from backend storage. |
@@ -1090,7 +1090,7 @@ backend: str
Unique name of the auth backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_identity_whitelist#backend AwsAuthBackendIdentityWhitelist#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_identity_whitelist#backend AwsAuthBackendIdentityWhitelist#backend}
---
@@ -1104,7 +1104,7 @@ disable_periodic_tidy: typing.Union[bool, IResolvable]
If true, disables the periodic tidying of the identiy whitelist entries.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_identity_whitelist#disable_periodic_tidy AwsAuthBackendIdentityWhitelist#disable_periodic_tidy}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_identity_whitelist#disable_periodic_tidy AwsAuthBackendIdentityWhitelist#disable_periodic_tidy}
---
@@ -1116,7 +1116,7 @@ id: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_identity_whitelist#id AwsAuthBackendIdentityWhitelist#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_identity_whitelist#id AwsAuthBackendIdentityWhitelist#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1133,7 +1133,7 @@ namespace: str
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_identity_whitelist#namespace AwsAuthBackendIdentityWhitelist#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_identity_whitelist#namespace AwsAuthBackendIdentityWhitelist#namespace}
---
@@ -1147,7 +1147,7 @@ safety_buffer: typing.Union[int, float]
The amount of extra time that must have passed beyond the roletag expiration, before it's removed from backend storage.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_identity_whitelist#safety_buffer AwsAuthBackendIdentityWhitelist#safety_buffer}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_identity_whitelist#safety_buffer AwsAuthBackendIdentityWhitelist#safety_buffer}
---
diff --git a/docs/awsAuthBackendIdentityWhitelist.typescript.md b/docs/awsAuthBackendIdentityWhitelist.typescript.md
index 9329da25..c3ca55cc 100644
--- a/docs/awsAuthBackendIdentityWhitelist.typescript.md
+++ b/docs/awsAuthBackendIdentityWhitelist.typescript.md
@@ -4,7 +4,7 @@
### AwsAuthBackendIdentityWhitelist
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_identity_whitelist vault_aws_auth_backend_identity_whitelist}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_identity_whitelist vault_aws_auth_backend_identity_whitelist}.
#### Initializers
@@ -502,7 +502,7 @@ The construct id used in the generated config for the AwsAuthBackendIdentityWhit
The id of the existing AwsAuthBackendIdentityWhitelist that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_identity_whitelist#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_identity_whitelist#import import section} in the documentation of this resource for the id to use
---
@@ -830,7 +830,7 @@ const awsAuthBackendIdentityWhitelistConfig: awsAuthBackendIdentityWhitelist.Aws
| provisioners
| cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[]
| *No description.* |
| backend
| string
| Unique name of the auth backend to configure. |
| disablePeriodicTidy
| boolean \| cdktf.IResolvable
| If true, disables the periodic tidying of the identiy whitelist entries. |
-| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_identity_whitelist#id AwsAuthBackendIdentityWhitelist#id}. |
+| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_identity_whitelist#id AwsAuthBackendIdentityWhitelist#id}. |
| namespace
| string
| Target namespace. (requires Enterprise). |
| safetyBuffer
| number
| The amount of extra time that must have passed beyond the roletag expiration, before it's removed from backend storage. |
@@ -916,7 +916,7 @@ public readonly backend: string;
Unique name of the auth backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_identity_whitelist#backend AwsAuthBackendIdentityWhitelist#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_identity_whitelist#backend AwsAuthBackendIdentityWhitelist#backend}
---
@@ -930,7 +930,7 @@ public readonly disablePeriodicTidy: boolean | IResolvable;
If true, disables the periodic tidying of the identiy whitelist entries.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_identity_whitelist#disable_periodic_tidy AwsAuthBackendIdentityWhitelist#disable_periodic_tidy}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_identity_whitelist#disable_periodic_tidy AwsAuthBackendIdentityWhitelist#disable_periodic_tidy}
---
@@ -942,7 +942,7 @@ public readonly id: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_identity_whitelist#id AwsAuthBackendIdentityWhitelist#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_identity_whitelist#id AwsAuthBackendIdentityWhitelist#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -959,7 +959,7 @@ public readonly namespace: string;
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_identity_whitelist#namespace AwsAuthBackendIdentityWhitelist#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_identity_whitelist#namespace AwsAuthBackendIdentityWhitelist#namespace}
---
@@ -973,7 +973,7 @@ public readonly safetyBuffer: number;
The amount of extra time that must have passed beyond the roletag expiration, before it's removed from backend storage.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_identity_whitelist#safety_buffer AwsAuthBackendIdentityWhitelist#safety_buffer}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_identity_whitelist#safety_buffer AwsAuthBackendIdentityWhitelist#safety_buffer}
---
diff --git a/docs/awsAuthBackendLogin.csharp.md b/docs/awsAuthBackendLogin.csharp.md
index 5921af9c..e9603480 100644
--- a/docs/awsAuthBackendLogin.csharp.md
+++ b/docs/awsAuthBackendLogin.csharp.md
@@ -4,7 +4,7 @@
### AwsAuthBackendLogin
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login vault_aws_auth_backend_login}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login vault_aws_auth_backend_login}.
#### Initializers
@@ -551,7 +551,7 @@ The construct id used in the generated config for the AwsAuthBackendLogin to imp
The id of the existing AwsAuthBackendLogin that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#import import section} in the documentation of this resource for the id to use
---
@@ -1144,7 +1144,7 @@ new AwsAuthBackendLoginConfig {
| IamRequestBody
| string
| The Base64-encoded body of the signed request. |
| IamRequestHeaders
| string
| The Base64-encoded, JSON serialized representation of the sts:GetCallerIdentity HTTP request headers. |
| IamRequestUrl
| string
| The Base64-encoded HTTP URL used in the signed request. |
-| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#id AwsAuthBackendLogin#id}. |
+| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#id AwsAuthBackendLogin#id}. |
| Identity
| string
| Base64-encoded EC2 instance identity document to authenticate with. |
| Namespace
| string
| Target namespace. (requires Enterprise). |
| Nonce
| string
| The nonce to be used for subsequent login requests. |
@@ -1234,7 +1234,7 @@ public string Backend { get; set; }
AWS Auth Backend to read the token from.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#backend AwsAuthBackendLogin#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#backend AwsAuthBackendLogin#backend}
---
@@ -1248,7 +1248,7 @@ public string IamHttpRequestMethod { get; set; }
The HTTP method used in the signed request.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#iam_http_request_method AwsAuthBackendLogin#iam_http_request_method}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#iam_http_request_method AwsAuthBackendLogin#iam_http_request_method}
---
@@ -1262,7 +1262,7 @@ public string IamRequestBody { get; set; }
The Base64-encoded body of the signed request.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#iam_request_body AwsAuthBackendLogin#iam_request_body}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#iam_request_body AwsAuthBackendLogin#iam_request_body}
---
@@ -1276,7 +1276,7 @@ public string IamRequestHeaders { get; set; }
The Base64-encoded, JSON serialized representation of the sts:GetCallerIdentity HTTP request headers.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#iam_request_headers AwsAuthBackendLogin#iam_request_headers}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#iam_request_headers AwsAuthBackendLogin#iam_request_headers}
---
@@ -1290,7 +1290,7 @@ public string IamRequestUrl { get; set; }
The Base64-encoded HTTP URL used in the signed request.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#iam_request_url AwsAuthBackendLogin#iam_request_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#iam_request_url AwsAuthBackendLogin#iam_request_url}
---
@@ -1302,7 +1302,7 @@ public string Id { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#id AwsAuthBackendLogin#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#id AwsAuthBackendLogin#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1319,7 +1319,7 @@ public string Identity { get; set; }
Base64-encoded EC2 instance identity document to authenticate with.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#identity AwsAuthBackendLogin#identity}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#identity AwsAuthBackendLogin#identity}
---
@@ -1333,7 +1333,7 @@ public string Namespace { get; set; }
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#namespace AwsAuthBackendLogin#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#namespace AwsAuthBackendLogin#namespace}
---
@@ -1347,7 +1347,7 @@ public string Nonce { get; set; }
The nonce to be used for subsequent login requests.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#nonce AwsAuthBackendLogin#nonce}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#nonce AwsAuthBackendLogin#nonce}
---
@@ -1361,7 +1361,7 @@ public string Pkcs7 { get; set; }
PKCS7 signature of the identity document to authenticate with, with all newline characters removed.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#pkcs7 AwsAuthBackendLogin#pkcs7}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#pkcs7 AwsAuthBackendLogin#pkcs7}
---
@@ -1375,7 +1375,7 @@ public string Role { get; set; }
AWS Auth Role to read the token from.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#role AwsAuthBackendLogin#role}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#role AwsAuthBackendLogin#role}
---
@@ -1389,7 +1389,7 @@ public string Signature { get; set; }
Base64-encoded SHA256 RSA signature of the instance identtiy document to authenticate with.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#signature AwsAuthBackendLogin#signature}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#signature AwsAuthBackendLogin#signature}
---
diff --git a/docs/awsAuthBackendLogin.go.md b/docs/awsAuthBackendLogin.go.md
index 8ba90c11..b522ea9a 100644
--- a/docs/awsAuthBackendLogin.go.md
+++ b/docs/awsAuthBackendLogin.go.md
@@ -4,7 +4,7 @@
### AwsAuthBackendLogin
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login vault_aws_auth_backend_login}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login vault_aws_auth_backend_login}.
#### Initializers
@@ -551,7 +551,7 @@ The construct id used in the generated config for the AwsAuthBackendLogin to imp
The id of the existing AwsAuthBackendLogin that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#import import section} in the documentation of this resource for the id to use
---
@@ -1144,7 +1144,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/awsauthbackendlogin"
| IamRequestBody
| *string
| The Base64-encoded body of the signed request. |
| IamRequestHeaders
| *string
| The Base64-encoded, JSON serialized representation of the sts:GetCallerIdentity HTTP request headers. |
| IamRequestUrl
| *string
| The Base64-encoded HTTP URL used in the signed request. |
-| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#id AwsAuthBackendLogin#id}. |
+| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#id AwsAuthBackendLogin#id}. |
| Identity
| *string
| Base64-encoded EC2 instance identity document to authenticate with. |
| Namespace
| *string
| Target namespace. (requires Enterprise). |
| Nonce
| *string
| The nonce to be used for subsequent login requests. |
@@ -1234,7 +1234,7 @@ Backend *string
AWS Auth Backend to read the token from.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#backend AwsAuthBackendLogin#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#backend AwsAuthBackendLogin#backend}
---
@@ -1248,7 +1248,7 @@ IamHttpRequestMethod *string
The HTTP method used in the signed request.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#iam_http_request_method AwsAuthBackendLogin#iam_http_request_method}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#iam_http_request_method AwsAuthBackendLogin#iam_http_request_method}
---
@@ -1262,7 +1262,7 @@ IamRequestBody *string
The Base64-encoded body of the signed request.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#iam_request_body AwsAuthBackendLogin#iam_request_body}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#iam_request_body AwsAuthBackendLogin#iam_request_body}
---
@@ -1276,7 +1276,7 @@ IamRequestHeaders *string
The Base64-encoded, JSON serialized representation of the sts:GetCallerIdentity HTTP request headers.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#iam_request_headers AwsAuthBackendLogin#iam_request_headers}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#iam_request_headers AwsAuthBackendLogin#iam_request_headers}
---
@@ -1290,7 +1290,7 @@ IamRequestUrl *string
The Base64-encoded HTTP URL used in the signed request.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#iam_request_url AwsAuthBackendLogin#iam_request_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#iam_request_url AwsAuthBackendLogin#iam_request_url}
---
@@ -1302,7 +1302,7 @@ Id *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#id AwsAuthBackendLogin#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#id AwsAuthBackendLogin#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1319,7 +1319,7 @@ Identity *string
Base64-encoded EC2 instance identity document to authenticate with.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#identity AwsAuthBackendLogin#identity}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#identity AwsAuthBackendLogin#identity}
---
@@ -1333,7 +1333,7 @@ Namespace *string
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#namespace AwsAuthBackendLogin#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#namespace AwsAuthBackendLogin#namespace}
---
@@ -1347,7 +1347,7 @@ Nonce *string
The nonce to be used for subsequent login requests.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#nonce AwsAuthBackendLogin#nonce}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#nonce AwsAuthBackendLogin#nonce}
---
@@ -1361,7 +1361,7 @@ Pkcs7 *string
PKCS7 signature of the identity document to authenticate with, with all newline characters removed.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#pkcs7 AwsAuthBackendLogin#pkcs7}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#pkcs7 AwsAuthBackendLogin#pkcs7}
---
@@ -1375,7 +1375,7 @@ Role *string
AWS Auth Role to read the token from.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#role AwsAuthBackendLogin#role}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#role AwsAuthBackendLogin#role}
---
@@ -1389,7 +1389,7 @@ Signature *string
Base64-encoded SHA256 RSA signature of the instance identtiy document to authenticate with.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#signature AwsAuthBackendLogin#signature}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#signature AwsAuthBackendLogin#signature}
---
diff --git a/docs/awsAuthBackendLogin.java.md b/docs/awsAuthBackendLogin.java.md
index 10bacdd6..08275921 100644
--- a/docs/awsAuthBackendLogin.java.md
+++ b/docs/awsAuthBackendLogin.java.md
@@ -4,7 +4,7 @@
### AwsAuthBackendLogin
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login vault_aws_auth_backend_login}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login vault_aws_auth_backend_login}.
#### Initializers
@@ -54,7 +54,7 @@ AwsAuthBackendLogin.Builder.create(Construct scope, java.lang.String id)
| iamRequestBody
| java.lang.String
| The Base64-encoded body of the signed request. |
| iamRequestHeaders
| java.lang.String
| The Base64-encoded, JSON serialized representation of the sts:GetCallerIdentity HTTP request headers. |
| iamRequestUrl
| java.lang.String
| The Base64-encoded HTTP URL used in the signed request. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#id AwsAuthBackendLogin#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#id AwsAuthBackendLogin#id}. |
| identity
| java.lang.String
| Base64-encoded EC2 instance identity document to authenticate with. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
| nonce
| java.lang.String
| The nonce to be used for subsequent login requests. |
@@ -130,7 +130,7 @@ Must be unique amongst siblings in the same scope
AWS Auth Backend to read the token from.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#backend AwsAuthBackendLogin#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#backend AwsAuthBackendLogin#backend}
---
@@ -140,7 +140,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The HTTP method used in the signed request.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#iam_http_request_method AwsAuthBackendLogin#iam_http_request_method}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#iam_http_request_method AwsAuthBackendLogin#iam_http_request_method}
---
@@ -150,7 +150,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The Base64-encoded body of the signed request.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#iam_request_body AwsAuthBackendLogin#iam_request_body}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#iam_request_body AwsAuthBackendLogin#iam_request_body}
---
@@ -160,7 +160,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The Base64-encoded, JSON serialized representation of the sts:GetCallerIdentity HTTP request headers.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#iam_request_headers AwsAuthBackendLogin#iam_request_headers}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#iam_request_headers AwsAuthBackendLogin#iam_request_headers}
---
@@ -170,7 +170,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The Base64-encoded HTTP URL used in the signed request.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#iam_request_url AwsAuthBackendLogin#iam_request_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#iam_request_url AwsAuthBackendLogin#iam_request_url}
---
@@ -178,7 +178,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#id AwsAuthBackendLogin#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#id AwsAuthBackendLogin#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -191,7 +191,7 @@ If you experience problems setting this value it might not be settable. Please t
Base64-encoded EC2 instance identity document to authenticate with.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#identity AwsAuthBackendLogin#identity}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#identity AwsAuthBackendLogin#identity}
---
@@ -201,7 +201,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#namespace AwsAuthBackendLogin#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#namespace AwsAuthBackendLogin#namespace}
---
@@ -211,7 +211,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The nonce to be used for subsequent login requests.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#nonce AwsAuthBackendLogin#nonce}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#nonce AwsAuthBackendLogin#nonce}
---
@@ -221,7 +221,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
PKCS7 signature of the identity document to authenticate with, with all newline characters removed.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#pkcs7 AwsAuthBackendLogin#pkcs7}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#pkcs7 AwsAuthBackendLogin#pkcs7}
---
@@ -231,7 +231,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
AWS Auth Role to read the token from.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#role AwsAuthBackendLogin#role}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#role AwsAuthBackendLogin#role}
---
@@ -241,7 +241,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Base64-encoded SHA256 RSA signature of the instance identtiy document to authenticate with.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#signature AwsAuthBackendLogin#signature}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#signature AwsAuthBackendLogin#signature}
---
@@ -752,7 +752,7 @@ The construct id used in the generated config for the AwsAuthBackendLogin to imp
The id of the existing AwsAuthBackendLogin that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#import import section} in the documentation of this resource for the id to use
---
@@ -1349,7 +1349,7 @@ AwsAuthBackendLoginConfig.builder()
| iamRequestBody
| java.lang.String
| The Base64-encoded body of the signed request. |
| iamRequestHeaders
| java.lang.String
| The Base64-encoded, JSON serialized representation of the sts:GetCallerIdentity HTTP request headers. |
| iamRequestUrl
| java.lang.String
| The Base64-encoded HTTP URL used in the signed request. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#id AwsAuthBackendLogin#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#id AwsAuthBackendLogin#id}. |
| identity
| java.lang.String
| Base64-encoded EC2 instance identity document to authenticate with. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
| nonce
| java.lang.String
| The nonce to be used for subsequent login requests. |
@@ -1439,7 +1439,7 @@ public java.lang.String getBackend();
AWS Auth Backend to read the token from.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#backend AwsAuthBackendLogin#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#backend AwsAuthBackendLogin#backend}
---
@@ -1453,7 +1453,7 @@ public java.lang.String getIamHttpRequestMethod();
The HTTP method used in the signed request.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#iam_http_request_method AwsAuthBackendLogin#iam_http_request_method}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#iam_http_request_method AwsAuthBackendLogin#iam_http_request_method}
---
@@ -1467,7 +1467,7 @@ public java.lang.String getIamRequestBody();
The Base64-encoded body of the signed request.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#iam_request_body AwsAuthBackendLogin#iam_request_body}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#iam_request_body AwsAuthBackendLogin#iam_request_body}
---
@@ -1481,7 +1481,7 @@ public java.lang.String getIamRequestHeaders();
The Base64-encoded, JSON serialized representation of the sts:GetCallerIdentity HTTP request headers.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#iam_request_headers AwsAuthBackendLogin#iam_request_headers}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#iam_request_headers AwsAuthBackendLogin#iam_request_headers}
---
@@ -1495,7 +1495,7 @@ public java.lang.String getIamRequestUrl();
The Base64-encoded HTTP URL used in the signed request.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#iam_request_url AwsAuthBackendLogin#iam_request_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#iam_request_url AwsAuthBackendLogin#iam_request_url}
---
@@ -1507,7 +1507,7 @@ public java.lang.String getId();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#id AwsAuthBackendLogin#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#id AwsAuthBackendLogin#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1524,7 +1524,7 @@ public java.lang.String getIdentity();
Base64-encoded EC2 instance identity document to authenticate with.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#identity AwsAuthBackendLogin#identity}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#identity AwsAuthBackendLogin#identity}
---
@@ -1538,7 +1538,7 @@ public java.lang.String getNamespace();
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#namespace AwsAuthBackendLogin#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#namespace AwsAuthBackendLogin#namespace}
---
@@ -1552,7 +1552,7 @@ public java.lang.String getNonce();
The nonce to be used for subsequent login requests.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#nonce AwsAuthBackendLogin#nonce}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#nonce AwsAuthBackendLogin#nonce}
---
@@ -1566,7 +1566,7 @@ public java.lang.String getPkcs7();
PKCS7 signature of the identity document to authenticate with, with all newline characters removed.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#pkcs7 AwsAuthBackendLogin#pkcs7}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#pkcs7 AwsAuthBackendLogin#pkcs7}
---
@@ -1580,7 +1580,7 @@ public java.lang.String getRole();
AWS Auth Role to read the token from.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#role AwsAuthBackendLogin#role}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#role AwsAuthBackendLogin#role}
---
@@ -1594,7 +1594,7 @@ public java.lang.String getSignature();
Base64-encoded SHA256 RSA signature of the instance identtiy document to authenticate with.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#signature AwsAuthBackendLogin#signature}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#signature AwsAuthBackendLogin#signature}
---
diff --git a/docs/awsAuthBackendLogin.python.md b/docs/awsAuthBackendLogin.python.md
index ba2df055..d4d03802 100644
--- a/docs/awsAuthBackendLogin.python.md
+++ b/docs/awsAuthBackendLogin.python.md
@@ -4,7 +4,7 @@
### AwsAuthBackendLogin
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login vault_aws_auth_backend_login}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login vault_aws_auth_backend_login}.
#### Initializers
@@ -52,7 +52,7 @@ awsAuthBackendLogin.AwsAuthBackendLogin(
| iam_request_body
| str
| The Base64-encoded body of the signed request. |
| iam_request_headers
| str
| The Base64-encoded, JSON serialized representation of the sts:GetCallerIdentity HTTP request headers. |
| iam_request_url
| str
| The Base64-encoded HTTP URL used in the signed request. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#id AwsAuthBackendLogin#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#id AwsAuthBackendLogin#id}. |
| identity
| str
| Base64-encoded EC2 instance identity document to authenticate with. |
| namespace
| str
| Target namespace. (requires Enterprise). |
| nonce
| str
| The nonce to be used for subsequent login requests. |
@@ -128,7 +128,7 @@ Must be unique amongst siblings in the same scope
AWS Auth Backend to read the token from.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#backend AwsAuthBackendLogin#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#backend AwsAuthBackendLogin#backend}
---
@@ -138,7 +138,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The HTTP method used in the signed request.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#iam_http_request_method AwsAuthBackendLogin#iam_http_request_method}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#iam_http_request_method AwsAuthBackendLogin#iam_http_request_method}
---
@@ -148,7 +148,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The Base64-encoded body of the signed request.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#iam_request_body AwsAuthBackendLogin#iam_request_body}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#iam_request_body AwsAuthBackendLogin#iam_request_body}
---
@@ -158,7 +158,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The Base64-encoded, JSON serialized representation of the sts:GetCallerIdentity HTTP request headers.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#iam_request_headers AwsAuthBackendLogin#iam_request_headers}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#iam_request_headers AwsAuthBackendLogin#iam_request_headers}
---
@@ -168,7 +168,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The Base64-encoded HTTP URL used in the signed request.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#iam_request_url AwsAuthBackendLogin#iam_request_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#iam_request_url AwsAuthBackendLogin#iam_request_url}
---
@@ -176,7 +176,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#id AwsAuthBackendLogin#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#id AwsAuthBackendLogin#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -189,7 +189,7 @@ If you experience problems setting this value it might not be settable. Please t
Base64-encoded EC2 instance identity document to authenticate with.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#identity AwsAuthBackendLogin#identity}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#identity AwsAuthBackendLogin#identity}
---
@@ -199,7 +199,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#namespace AwsAuthBackendLogin#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#namespace AwsAuthBackendLogin#namespace}
---
@@ -209,7 +209,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The nonce to be used for subsequent login requests.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#nonce AwsAuthBackendLogin#nonce}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#nonce AwsAuthBackendLogin#nonce}
---
@@ -219,7 +219,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
PKCS7 signature of the identity document to authenticate with, with all newline characters removed.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#pkcs7 AwsAuthBackendLogin#pkcs7}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#pkcs7 AwsAuthBackendLogin#pkcs7}
---
@@ -229,7 +229,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
AWS Auth Role to read the token from.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#role AwsAuthBackendLogin#role}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#role AwsAuthBackendLogin#role}
---
@@ -239,7 +239,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Base64-encoded SHA256 RSA signature of the instance identtiy document to authenticate with.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#signature AwsAuthBackendLogin#signature}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#signature AwsAuthBackendLogin#signature}
---
@@ -796,7 +796,7 @@ The construct id used in the generated config for the AwsAuthBackendLogin to imp
The id of the existing AwsAuthBackendLogin that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#import import section} in the documentation of this resource for the id to use
---
@@ -1389,7 +1389,7 @@ awsAuthBackendLogin.AwsAuthBackendLoginConfig(
| iam_request_body
| str
| The Base64-encoded body of the signed request. |
| iam_request_headers
| str
| The Base64-encoded, JSON serialized representation of the sts:GetCallerIdentity HTTP request headers. |
| iam_request_url
| str
| The Base64-encoded HTTP URL used in the signed request. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#id AwsAuthBackendLogin#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#id AwsAuthBackendLogin#id}. |
| identity
| str
| Base64-encoded EC2 instance identity document to authenticate with. |
| namespace
| str
| Target namespace. (requires Enterprise). |
| nonce
| str
| The nonce to be used for subsequent login requests. |
@@ -1479,7 +1479,7 @@ backend: str
AWS Auth Backend to read the token from.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#backend AwsAuthBackendLogin#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#backend AwsAuthBackendLogin#backend}
---
@@ -1493,7 +1493,7 @@ iam_http_request_method: str
The HTTP method used in the signed request.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#iam_http_request_method AwsAuthBackendLogin#iam_http_request_method}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#iam_http_request_method AwsAuthBackendLogin#iam_http_request_method}
---
@@ -1507,7 +1507,7 @@ iam_request_body: str
The Base64-encoded body of the signed request.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#iam_request_body AwsAuthBackendLogin#iam_request_body}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#iam_request_body AwsAuthBackendLogin#iam_request_body}
---
@@ -1521,7 +1521,7 @@ iam_request_headers: str
The Base64-encoded, JSON serialized representation of the sts:GetCallerIdentity HTTP request headers.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#iam_request_headers AwsAuthBackendLogin#iam_request_headers}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#iam_request_headers AwsAuthBackendLogin#iam_request_headers}
---
@@ -1535,7 +1535,7 @@ iam_request_url: str
The Base64-encoded HTTP URL used in the signed request.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#iam_request_url AwsAuthBackendLogin#iam_request_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#iam_request_url AwsAuthBackendLogin#iam_request_url}
---
@@ -1547,7 +1547,7 @@ id: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#id AwsAuthBackendLogin#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#id AwsAuthBackendLogin#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1564,7 +1564,7 @@ identity: str
Base64-encoded EC2 instance identity document to authenticate with.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#identity AwsAuthBackendLogin#identity}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#identity AwsAuthBackendLogin#identity}
---
@@ -1578,7 +1578,7 @@ namespace: str
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#namespace AwsAuthBackendLogin#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#namespace AwsAuthBackendLogin#namespace}
---
@@ -1592,7 +1592,7 @@ nonce: str
The nonce to be used for subsequent login requests.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#nonce AwsAuthBackendLogin#nonce}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#nonce AwsAuthBackendLogin#nonce}
---
@@ -1606,7 +1606,7 @@ pkcs7: str
PKCS7 signature of the identity document to authenticate with, with all newline characters removed.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#pkcs7 AwsAuthBackendLogin#pkcs7}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#pkcs7 AwsAuthBackendLogin#pkcs7}
---
@@ -1620,7 +1620,7 @@ role: str
AWS Auth Role to read the token from.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#role AwsAuthBackendLogin#role}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#role AwsAuthBackendLogin#role}
---
@@ -1634,7 +1634,7 @@ signature: str
Base64-encoded SHA256 RSA signature of the instance identtiy document to authenticate with.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#signature AwsAuthBackendLogin#signature}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#signature AwsAuthBackendLogin#signature}
---
diff --git a/docs/awsAuthBackendLogin.typescript.md b/docs/awsAuthBackendLogin.typescript.md
index 34f36428..93cdf39a 100644
--- a/docs/awsAuthBackendLogin.typescript.md
+++ b/docs/awsAuthBackendLogin.typescript.md
@@ -4,7 +4,7 @@
### AwsAuthBackendLogin
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login vault_aws_auth_backend_login}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login vault_aws_auth_backend_login}.
#### Initializers
@@ -551,7 +551,7 @@ The construct id used in the generated config for the AwsAuthBackendLogin to imp
The id of the existing AwsAuthBackendLogin that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#import import section} in the documentation of this resource for the id to use
---
@@ -1124,7 +1124,7 @@ const awsAuthBackendLoginConfig: awsAuthBackendLogin.AwsAuthBackendLoginConfig =
| iamRequestBody
| string
| The Base64-encoded body of the signed request. |
| iamRequestHeaders
| string
| The Base64-encoded, JSON serialized representation of the sts:GetCallerIdentity HTTP request headers. |
| iamRequestUrl
| string
| The Base64-encoded HTTP URL used in the signed request. |
-| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#id AwsAuthBackendLogin#id}. |
+| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#id AwsAuthBackendLogin#id}. |
| identity
| string
| Base64-encoded EC2 instance identity document to authenticate with. |
| namespace
| string
| Target namespace. (requires Enterprise). |
| nonce
| string
| The nonce to be used for subsequent login requests. |
@@ -1214,7 +1214,7 @@ public readonly backend: string;
AWS Auth Backend to read the token from.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#backend AwsAuthBackendLogin#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#backend AwsAuthBackendLogin#backend}
---
@@ -1228,7 +1228,7 @@ public readonly iamHttpRequestMethod: string;
The HTTP method used in the signed request.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#iam_http_request_method AwsAuthBackendLogin#iam_http_request_method}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#iam_http_request_method AwsAuthBackendLogin#iam_http_request_method}
---
@@ -1242,7 +1242,7 @@ public readonly iamRequestBody: string;
The Base64-encoded body of the signed request.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#iam_request_body AwsAuthBackendLogin#iam_request_body}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#iam_request_body AwsAuthBackendLogin#iam_request_body}
---
@@ -1256,7 +1256,7 @@ public readonly iamRequestHeaders: string;
The Base64-encoded, JSON serialized representation of the sts:GetCallerIdentity HTTP request headers.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#iam_request_headers AwsAuthBackendLogin#iam_request_headers}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#iam_request_headers AwsAuthBackendLogin#iam_request_headers}
---
@@ -1270,7 +1270,7 @@ public readonly iamRequestUrl: string;
The Base64-encoded HTTP URL used in the signed request.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#iam_request_url AwsAuthBackendLogin#iam_request_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#iam_request_url AwsAuthBackendLogin#iam_request_url}
---
@@ -1282,7 +1282,7 @@ public readonly id: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#id AwsAuthBackendLogin#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#id AwsAuthBackendLogin#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1299,7 +1299,7 @@ public readonly identity: string;
Base64-encoded EC2 instance identity document to authenticate with.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#identity AwsAuthBackendLogin#identity}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#identity AwsAuthBackendLogin#identity}
---
@@ -1313,7 +1313,7 @@ public readonly namespace: string;
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#namespace AwsAuthBackendLogin#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#namespace AwsAuthBackendLogin#namespace}
---
@@ -1327,7 +1327,7 @@ public readonly nonce: string;
The nonce to be used for subsequent login requests.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#nonce AwsAuthBackendLogin#nonce}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#nonce AwsAuthBackendLogin#nonce}
---
@@ -1341,7 +1341,7 @@ public readonly pkcs7: string;
PKCS7 signature of the identity document to authenticate with, with all newline characters removed.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#pkcs7 AwsAuthBackendLogin#pkcs7}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#pkcs7 AwsAuthBackendLogin#pkcs7}
---
@@ -1355,7 +1355,7 @@ public readonly role: string;
AWS Auth Role to read the token from.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#role AwsAuthBackendLogin#role}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#role AwsAuthBackendLogin#role}
---
@@ -1369,7 +1369,7 @@ public readonly signature: string;
Base64-encoded SHA256 RSA signature of the instance identtiy document to authenticate with.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#signature AwsAuthBackendLogin#signature}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#signature AwsAuthBackendLogin#signature}
---
diff --git a/docs/awsAuthBackendRole.csharp.md b/docs/awsAuthBackendRole.csharp.md
index 1e8a6bb2..b1033a35 100644
--- a/docs/awsAuthBackendRole.csharp.md
+++ b/docs/awsAuthBackendRole.csharp.md
@@ -4,7 +4,7 @@
### AwsAuthBackendRole
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role vault_aws_auth_backend_role}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role vault_aws_auth_backend_role}.
#### Initializers
@@ -663,7 +663,7 @@ The construct id used in the generated config for the AwsAuthBackendRole to impo
The id of the existing AwsAuthBackendRole that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#import import section} in the documentation of this resource for the id to use
---
@@ -1579,7 +1579,7 @@ new AwsAuthBackendRoleConfig {
| BoundSubnetIds
| string[]
| Only EC2 instances associated with this subnet ID will be permitted to log in. |
| BoundVpcIds
| string[]
| Only EC2 instances associated with this VPC ID will be permitted to log in. |
| DisallowReauthentication
| object
| When true, only allows a single token to be granted per instance ID. |
-| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#id AwsAuthBackendRole#id}. |
+| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#id AwsAuthBackendRole#id}. |
| InferredAwsRegion
| string
| The region to search for the inferred entities in. |
| InferredEntityType
| string
| The type of inferencing Vault should do. |
| Namespace
| string
| Target namespace. (requires Enterprise). |
@@ -1677,7 +1677,7 @@ public string Role { get; set; }
Name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#role AwsAuthBackendRole#role}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#role AwsAuthBackendRole#role}
---
@@ -1691,7 +1691,7 @@ public object AllowInstanceMigration { get; set; }
When true, allows migration of the underlying instance where the client resides. Use with caution.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#allow_instance_migration AwsAuthBackendRole#allow_instance_migration}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#allow_instance_migration AwsAuthBackendRole#allow_instance_migration}
---
@@ -1705,7 +1705,7 @@ public string AuthType { get; set; }
The auth type permitted for this role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#auth_type AwsAuthBackendRole#auth_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#auth_type AwsAuthBackendRole#auth_type}
---
@@ -1719,7 +1719,7 @@ public string Backend { get; set; }
Unique name of the auth backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#backend AwsAuthBackendRole#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#backend AwsAuthBackendRole#backend}
---
@@ -1733,7 +1733,7 @@ public string[] BoundAccountIds { get; set; }
Only EC2 instances with this account ID in their identity document will be permitted to log in.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_account_ids AwsAuthBackendRole#bound_account_ids}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_account_ids AwsAuthBackendRole#bound_account_ids}
---
@@ -1747,7 +1747,7 @@ public string[] BoundAmiIds { get; set; }
Only EC2 instances using this AMI ID will be permitted to log in.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_ami_ids AwsAuthBackendRole#bound_ami_ids}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_ami_ids AwsAuthBackendRole#bound_ami_ids}
---
@@ -1761,7 +1761,7 @@ public string[] BoundEc2InstanceIds { get; set; }
Only EC2 instances that match this instance ID will be permitted to log in.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_ec2_instance_ids AwsAuthBackendRole#bound_ec2_instance_ids}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_ec2_instance_ids AwsAuthBackendRole#bound_ec2_instance_ids}
---
@@ -1775,7 +1775,7 @@ public string[] BoundIamInstanceProfileArns { get; set; }
Only EC2 instances associated with an IAM instance profile ARN that matches this value will be permitted to log in.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_iam_instance_profile_arns AwsAuthBackendRole#bound_iam_instance_profile_arns}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_iam_instance_profile_arns AwsAuthBackendRole#bound_iam_instance_profile_arns}
---
@@ -1789,7 +1789,7 @@ public string[] BoundIamPrincipalArns { get; set; }
The IAM principal that must be authenticated using the iam auth method.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_iam_principal_arns AwsAuthBackendRole#bound_iam_principal_arns}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_iam_principal_arns AwsAuthBackendRole#bound_iam_principal_arns}
---
@@ -1803,7 +1803,7 @@ public string[] BoundIamRoleArns { get; set; }
Only EC2 instances that match this IAM role ARN will be permitted to log in.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_iam_role_arns AwsAuthBackendRole#bound_iam_role_arns}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_iam_role_arns AwsAuthBackendRole#bound_iam_role_arns}
---
@@ -1817,7 +1817,7 @@ public string[] BoundRegions { get; set; }
Only EC2 instances in this region will be permitted to log in.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_regions AwsAuthBackendRole#bound_regions}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_regions AwsAuthBackendRole#bound_regions}
---
@@ -1831,7 +1831,7 @@ public string[] BoundSubnetIds { get; set; }
Only EC2 instances associated with this subnet ID will be permitted to log in.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_subnet_ids AwsAuthBackendRole#bound_subnet_ids}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_subnet_ids AwsAuthBackendRole#bound_subnet_ids}
---
@@ -1845,7 +1845,7 @@ public string[] BoundVpcIds { get; set; }
Only EC2 instances associated with this VPC ID will be permitted to log in.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_vpc_ids AwsAuthBackendRole#bound_vpc_ids}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_vpc_ids AwsAuthBackendRole#bound_vpc_ids}
---
@@ -1859,7 +1859,7 @@ public object DisallowReauthentication { get; set; }
When true, only allows a single token to be granted per instance ID.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#disallow_reauthentication AwsAuthBackendRole#disallow_reauthentication}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#disallow_reauthentication AwsAuthBackendRole#disallow_reauthentication}
---
@@ -1871,7 +1871,7 @@ public string Id { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#id AwsAuthBackendRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#id AwsAuthBackendRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1888,7 +1888,7 @@ public string InferredAwsRegion { get; set; }
The region to search for the inferred entities in.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#inferred_aws_region AwsAuthBackendRole#inferred_aws_region}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#inferred_aws_region AwsAuthBackendRole#inferred_aws_region}
---
@@ -1902,7 +1902,7 @@ public string InferredEntityType { get; set; }
The type of inferencing Vault should do.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#inferred_entity_type AwsAuthBackendRole#inferred_entity_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#inferred_entity_type AwsAuthBackendRole#inferred_entity_type}
---
@@ -1916,7 +1916,7 @@ public string Namespace { get; set; }
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#namespace AwsAuthBackendRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#namespace AwsAuthBackendRole#namespace}
---
@@ -1932,7 +1932,7 @@ Whether or not Vault should resolve the bound_iam_principal_arn to an AWS Unique
When true, deleting a principal and recreating it with the same name won't automatically grant the new principal the same roles in Vault that the old principal had.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#resolve_aws_unique_ids AwsAuthBackendRole#resolve_aws_unique_ids}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#resolve_aws_unique_ids AwsAuthBackendRole#resolve_aws_unique_ids}
---
@@ -1946,7 +1946,7 @@ public string RoleTag { get; set; }
The key of the tag on EC2 instance to use for role tags.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#role_tag AwsAuthBackendRole#role_tag}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#role_tag AwsAuthBackendRole#role_tag}
---
@@ -1960,7 +1960,7 @@ public string[] TokenBoundCidrs { get; set; }
Specifies the blocks of IP addresses which are allowed to use the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_bound_cidrs AwsAuthBackendRole#token_bound_cidrs}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_bound_cidrs AwsAuthBackendRole#token_bound_cidrs}
---
@@ -1974,7 +1974,7 @@ public double TokenExplicitMaxTtl { get; set; }
Generated Token's Explicit Maximum TTL in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_explicit_max_ttl AwsAuthBackendRole#token_explicit_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_explicit_max_ttl AwsAuthBackendRole#token_explicit_max_ttl}
---
@@ -1988,7 +1988,7 @@ public double TokenMaxTtl { get; set; }
The maximum lifetime of the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_max_ttl AwsAuthBackendRole#token_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_max_ttl AwsAuthBackendRole#token_max_ttl}
---
@@ -2002,7 +2002,7 @@ public object TokenNoDefaultPolicy { get; set; }
If true, the 'default' policy will not automatically be added to generated tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_no_default_policy AwsAuthBackendRole#token_no_default_policy}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_no_default_policy AwsAuthBackendRole#token_no_default_policy}
---
@@ -2016,7 +2016,7 @@ public double TokenNumUses { get; set; }
The maximum number of times a token may be used, a value of zero means unlimited.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_num_uses AwsAuthBackendRole#token_num_uses}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_num_uses AwsAuthBackendRole#token_num_uses}
---
@@ -2030,7 +2030,7 @@ public double TokenPeriod { get; set; }
Generated Token's Period.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_period AwsAuthBackendRole#token_period}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_period AwsAuthBackendRole#token_period}
---
@@ -2044,7 +2044,7 @@ public string[] TokenPolicies { get; set; }
Generated Token's Policies.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_policies AwsAuthBackendRole#token_policies}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_policies AwsAuthBackendRole#token_policies}
---
@@ -2058,7 +2058,7 @@ public double TokenTtl { get; set; }
The initial ttl of the token to generate in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_ttl AwsAuthBackendRole#token_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_ttl AwsAuthBackendRole#token_ttl}
---
@@ -2072,7 +2072,7 @@ public string TokenType { get; set; }
The type of token to generate, service or batch.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_type AwsAuthBackendRole#token_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_type AwsAuthBackendRole#token_type}
---
diff --git a/docs/awsAuthBackendRole.go.md b/docs/awsAuthBackendRole.go.md
index 45c4f2c0..4505cbeb 100644
--- a/docs/awsAuthBackendRole.go.md
+++ b/docs/awsAuthBackendRole.go.md
@@ -4,7 +4,7 @@
### AwsAuthBackendRole
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role vault_aws_auth_backend_role}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role vault_aws_auth_backend_role}.
#### Initializers
@@ -663,7 +663,7 @@ The construct id used in the generated config for the AwsAuthBackendRole to impo
The id of the existing AwsAuthBackendRole that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#import import section} in the documentation of this resource for the id to use
---
@@ -1579,7 +1579,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/awsauthbackendrole"
| BoundSubnetIds
| *[]*string
| Only EC2 instances associated with this subnet ID will be permitted to log in. |
| BoundVpcIds
| *[]*string
| Only EC2 instances associated with this VPC ID will be permitted to log in. |
| DisallowReauthentication
| interface{}
| When true, only allows a single token to be granted per instance ID. |
-| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#id AwsAuthBackendRole#id}. |
+| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#id AwsAuthBackendRole#id}. |
| InferredAwsRegion
| *string
| The region to search for the inferred entities in. |
| InferredEntityType
| *string
| The type of inferencing Vault should do. |
| Namespace
| *string
| Target namespace. (requires Enterprise). |
@@ -1677,7 +1677,7 @@ Role *string
Name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#role AwsAuthBackendRole#role}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#role AwsAuthBackendRole#role}
---
@@ -1691,7 +1691,7 @@ AllowInstanceMigration interface{}
When true, allows migration of the underlying instance where the client resides. Use with caution.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#allow_instance_migration AwsAuthBackendRole#allow_instance_migration}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#allow_instance_migration AwsAuthBackendRole#allow_instance_migration}
---
@@ -1705,7 +1705,7 @@ AuthType *string
The auth type permitted for this role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#auth_type AwsAuthBackendRole#auth_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#auth_type AwsAuthBackendRole#auth_type}
---
@@ -1719,7 +1719,7 @@ Backend *string
Unique name of the auth backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#backend AwsAuthBackendRole#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#backend AwsAuthBackendRole#backend}
---
@@ -1733,7 +1733,7 @@ BoundAccountIds *[]*string
Only EC2 instances with this account ID in their identity document will be permitted to log in.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_account_ids AwsAuthBackendRole#bound_account_ids}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_account_ids AwsAuthBackendRole#bound_account_ids}
---
@@ -1747,7 +1747,7 @@ BoundAmiIds *[]*string
Only EC2 instances using this AMI ID will be permitted to log in.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_ami_ids AwsAuthBackendRole#bound_ami_ids}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_ami_ids AwsAuthBackendRole#bound_ami_ids}
---
@@ -1761,7 +1761,7 @@ BoundEc2InstanceIds *[]*string
Only EC2 instances that match this instance ID will be permitted to log in.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_ec2_instance_ids AwsAuthBackendRole#bound_ec2_instance_ids}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_ec2_instance_ids AwsAuthBackendRole#bound_ec2_instance_ids}
---
@@ -1775,7 +1775,7 @@ BoundIamInstanceProfileArns *[]*string
Only EC2 instances associated with an IAM instance profile ARN that matches this value will be permitted to log in.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_iam_instance_profile_arns AwsAuthBackendRole#bound_iam_instance_profile_arns}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_iam_instance_profile_arns AwsAuthBackendRole#bound_iam_instance_profile_arns}
---
@@ -1789,7 +1789,7 @@ BoundIamPrincipalArns *[]*string
The IAM principal that must be authenticated using the iam auth method.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_iam_principal_arns AwsAuthBackendRole#bound_iam_principal_arns}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_iam_principal_arns AwsAuthBackendRole#bound_iam_principal_arns}
---
@@ -1803,7 +1803,7 @@ BoundIamRoleArns *[]*string
Only EC2 instances that match this IAM role ARN will be permitted to log in.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_iam_role_arns AwsAuthBackendRole#bound_iam_role_arns}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_iam_role_arns AwsAuthBackendRole#bound_iam_role_arns}
---
@@ -1817,7 +1817,7 @@ BoundRegions *[]*string
Only EC2 instances in this region will be permitted to log in.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_regions AwsAuthBackendRole#bound_regions}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_regions AwsAuthBackendRole#bound_regions}
---
@@ -1831,7 +1831,7 @@ BoundSubnetIds *[]*string
Only EC2 instances associated with this subnet ID will be permitted to log in.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_subnet_ids AwsAuthBackendRole#bound_subnet_ids}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_subnet_ids AwsAuthBackendRole#bound_subnet_ids}
---
@@ -1845,7 +1845,7 @@ BoundVpcIds *[]*string
Only EC2 instances associated with this VPC ID will be permitted to log in.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_vpc_ids AwsAuthBackendRole#bound_vpc_ids}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_vpc_ids AwsAuthBackendRole#bound_vpc_ids}
---
@@ -1859,7 +1859,7 @@ DisallowReauthentication interface{}
When true, only allows a single token to be granted per instance ID.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#disallow_reauthentication AwsAuthBackendRole#disallow_reauthentication}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#disallow_reauthentication AwsAuthBackendRole#disallow_reauthentication}
---
@@ -1871,7 +1871,7 @@ Id *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#id AwsAuthBackendRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#id AwsAuthBackendRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1888,7 +1888,7 @@ InferredAwsRegion *string
The region to search for the inferred entities in.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#inferred_aws_region AwsAuthBackendRole#inferred_aws_region}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#inferred_aws_region AwsAuthBackendRole#inferred_aws_region}
---
@@ -1902,7 +1902,7 @@ InferredEntityType *string
The type of inferencing Vault should do.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#inferred_entity_type AwsAuthBackendRole#inferred_entity_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#inferred_entity_type AwsAuthBackendRole#inferred_entity_type}
---
@@ -1916,7 +1916,7 @@ Namespace *string
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#namespace AwsAuthBackendRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#namespace AwsAuthBackendRole#namespace}
---
@@ -1932,7 +1932,7 @@ Whether or not Vault should resolve the bound_iam_principal_arn to an AWS Unique
When true, deleting a principal and recreating it with the same name won't automatically grant the new principal the same roles in Vault that the old principal had.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#resolve_aws_unique_ids AwsAuthBackendRole#resolve_aws_unique_ids}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#resolve_aws_unique_ids AwsAuthBackendRole#resolve_aws_unique_ids}
---
@@ -1946,7 +1946,7 @@ RoleTag *string
The key of the tag on EC2 instance to use for role tags.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#role_tag AwsAuthBackendRole#role_tag}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#role_tag AwsAuthBackendRole#role_tag}
---
@@ -1960,7 +1960,7 @@ TokenBoundCidrs *[]*string
Specifies the blocks of IP addresses which are allowed to use the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_bound_cidrs AwsAuthBackendRole#token_bound_cidrs}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_bound_cidrs AwsAuthBackendRole#token_bound_cidrs}
---
@@ -1974,7 +1974,7 @@ TokenExplicitMaxTtl *f64
Generated Token's Explicit Maximum TTL in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_explicit_max_ttl AwsAuthBackendRole#token_explicit_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_explicit_max_ttl AwsAuthBackendRole#token_explicit_max_ttl}
---
@@ -1988,7 +1988,7 @@ TokenMaxTtl *f64
The maximum lifetime of the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_max_ttl AwsAuthBackendRole#token_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_max_ttl AwsAuthBackendRole#token_max_ttl}
---
@@ -2002,7 +2002,7 @@ TokenNoDefaultPolicy interface{}
If true, the 'default' policy will not automatically be added to generated tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_no_default_policy AwsAuthBackendRole#token_no_default_policy}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_no_default_policy AwsAuthBackendRole#token_no_default_policy}
---
@@ -2016,7 +2016,7 @@ TokenNumUses *f64
The maximum number of times a token may be used, a value of zero means unlimited.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_num_uses AwsAuthBackendRole#token_num_uses}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_num_uses AwsAuthBackendRole#token_num_uses}
---
@@ -2030,7 +2030,7 @@ TokenPeriod *f64
Generated Token's Period.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_period AwsAuthBackendRole#token_period}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_period AwsAuthBackendRole#token_period}
---
@@ -2044,7 +2044,7 @@ TokenPolicies *[]*string
Generated Token's Policies.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_policies AwsAuthBackendRole#token_policies}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_policies AwsAuthBackendRole#token_policies}
---
@@ -2058,7 +2058,7 @@ TokenTtl *f64
The initial ttl of the token to generate in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_ttl AwsAuthBackendRole#token_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_ttl AwsAuthBackendRole#token_ttl}
---
@@ -2072,7 +2072,7 @@ TokenType *string
The type of token to generate, service or batch.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_type AwsAuthBackendRole#token_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_type AwsAuthBackendRole#token_type}
---
diff --git a/docs/awsAuthBackendRole.java.md b/docs/awsAuthBackendRole.java.md
index 9c9a92c9..861f1cdd 100644
--- a/docs/awsAuthBackendRole.java.md
+++ b/docs/awsAuthBackendRole.java.md
@@ -4,7 +4,7 @@
### AwsAuthBackendRole
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role vault_aws_auth_backend_role}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role vault_aws_auth_backend_role}.
#### Initializers
@@ -84,7 +84,7 @@ AwsAuthBackendRole.Builder.create(Construct scope, java.lang.String id)
| boundSubnetIds
| java.util.List
| Only EC2 instances associated with this subnet ID will be permitted to log in. |
| boundVpcIds
| java.util.List
| Only EC2 instances associated with this VPC ID will be permitted to log in. |
| disallowReauthentication
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| When true, only allows a single token to be granted per instance ID. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#id AwsAuthBackendRole#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#id AwsAuthBackendRole#id}. |
| inferredAwsRegion
| java.lang.String
| The region to search for the inferred entities in. |
| inferredEntityType
| java.lang.String
| The type of inferencing Vault should do. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
@@ -168,7 +168,7 @@ Must be unique amongst siblings in the same scope
Name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#role AwsAuthBackendRole#role}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#role AwsAuthBackendRole#role}
---
@@ -178,7 +178,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
When true, allows migration of the underlying instance where the client resides. Use with caution.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#allow_instance_migration AwsAuthBackendRole#allow_instance_migration}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#allow_instance_migration AwsAuthBackendRole#allow_instance_migration}
---
@@ -188,7 +188,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The auth type permitted for this role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#auth_type AwsAuthBackendRole#auth_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#auth_type AwsAuthBackendRole#auth_type}
---
@@ -198,7 +198,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Unique name of the auth backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#backend AwsAuthBackendRole#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#backend AwsAuthBackendRole#backend}
---
@@ -208,7 +208,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Only EC2 instances with this account ID in their identity document will be permitted to log in.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_account_ids AwsAuthBackendRole#bound_account_ids}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_account_ids AwsAuthBackendRole#bound_account_ids}
---
@@ -218,7 +218,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Only EC2 instances using this AMI ID will be permitted to log in.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_ami_ids AwsAuthBackendRole#bound_ami_ids}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_ami_ids AwsAuthBackendRole#bound_ami_ids}
---
@@ -228,7 +228,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Only EC2 instances that match this instance ID will be permitted to log in.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_ec2_instance_ids AwsAuthBackendRole#bound_ec2_instance_ids}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_ec2_instance_ids AwsAuthBackendRole#bound_ec2_instance_ids}
---
@@ -238,7 +238,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Only EC2 instances associated with an IAM instance profile ARN that matches this value will be permitted to log in.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_iam_instance_profile_arns AwsAuthBackendRole#bound_iam_instance_profile_arns}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_iam_instance_profile_arns AwsAuthBackendRole#bound_iam_instance_profile_arns}
---
@@ -248,7 +248,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The IAM principal that must be authenticated using the iam auth method.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_iam_principal_arns AwsAuthBackendRole#bound_iam_principal_arns}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_iam_principal_arns AwsAuthBackendRole#bound_iam_principal_arns}
---
@@ -258,7 +258,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Only EC2 instances that match this IAM role ARN will be permitted to log in.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_iam_role_arns AwsAuthBackendRole#bound_iam_role_arns}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_iam_role_arns AwsAuthBackendRole#bound_iam_role_arns}
---
@@ -268,7 +268,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Only EC2 instances in this region will be permitted to log in.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_regions AwsAuthBackendRole#bound_regions}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_regions AwsAuthBackendRole#bound_regions}
---
@@ -278,7 +278,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Only EC2 instances associated with this subnet ID will be permitted to log in.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_subnet_ids AwsAuthBackendRole#bound_subnet_ids}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_subnet_ids AwsAuthBackendRole#bound_subnet_ids}
---
@@ -288,7 +288,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Only EC2 instances associated with this VPC ID will be permitted to log in.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_vpc_ids AwsAuthBackendRole#bound_vpc_ids}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_vpc_ids AwsAuthBackendRole#bound_vpc_ids}
---
@@ -298,7 +298,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
When true, only allows a single token to be granted per instance ID.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#disallow_reauthentication AwsAuthBackendRole#disallow_reauthentication}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#disallow_reauthentication AwsAuthBackendRole#disallow_reauthentication}
---
@@ -306,7 +306,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#id AwsAuthBackendRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#id AwsAuthBackendRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -319,7 +319,7 @@ If you experience problems setting this value it might not be settable. Please t
The region to search for the inferred entities in.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#inferred_aws_region AwsAuthBackendRole#inferred_aws_region}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#inferred_aws_region AwsAuthBackendRole#inferred_aws_region}
---
@@ -329,7 +329,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The type of inferencing Vault should do.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#inferred_entity_type AwsAuthBackendRole#inferred_entity_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#inferred_entity_type AwsAuthBackendRole#inferred_entity_type}
---
@@ -339,7 +339,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#namespace AwsAuthBackendRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#namespace AwsAuthBackendRole#namespace}
---
@@ -351,7 +351,7 @@ Whether or not Vault should resolve the bound_iam_principal_arn to an AWS Unique
When true, deleting a principal and recreating it with the same name won't automatically grant the new principal the same roles in Vault that the old principal had.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#resolve_aws_unique_ids AwsAuthBackendRole#resolve_aws_unique_ids}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#resolve_aws_unique_ids AwsAuthBackendRole#resolve_aws_unique_ids}
---
@@ -361,7 +361,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The key of the tag on EC2 instance to use for role tags.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#role_tag AwsAuthBackendRole#role_tag}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#role_tag AwsAuthBackendRole#role_tag}
---
@@ -371,7 +371,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Specifies the blocks of IP addresses which are allowed to use the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_bound_cidrs AwsAuthBackendRole#token_bound_cidrs}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_bound_cidrs AwsAuthBackendRole#token_bound_cidrs}
---
@@ -381,7 +381,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Generated Token's Explicit Maximum TTL in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_explicit_max_ttl AwsAuthBackendRole#token_explicit_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_explicit_max_ttl AwsAuthBackendRole#token_explicit_max_ttl}
---
@@ -391,7 +391,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The maximum lifetime of the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_max_ttl AwsAuthBackendRole#token_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_max_ttl AwsAuthBackendRole#token_max_ttl}
---
@@ -401,7 +401,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
If true, the 'default' policy will not automatically be added to generated tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_no_default_policy AwsAuthBackendRole#token_no_default_policy}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_no_default_policy AwsAuthBackendRole#token_no_default_policy}
---
@@ -411,7 +411,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The maximum number of times a token may be used, a value of zero means unlimited.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_num_uses AwsAuthBackendRole#token_num_uses}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_num_uses AwsAuthBackendRole#token_num_uses}
---
@@ -421,7 +421,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Generated Token's Period.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_period AwsAuthBackendRole#token_period}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_period AwsAuthBackendRole#token_period}
---
@@ -431,7 +431,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Generated Token's Policies.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_policies AwsAuthBackendRole#token_policies}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_policies AwsAuthBackendRole#token_policies}
---
@@ -441,7 +441,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The initial ttl of the token to generate in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_ttl AwsAuthBackendRole#token_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_ttl AwsAuthBackendRole#token_ttl}
---
@@ -451,7 +451,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The type of token to generate, service or batch.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_type AwsAuthBackendRole#token_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_type AwsAuthBackendRole#token_type}
---
@@ -1074,7 +1074,7 @@ The construct id used in the generated config for the AwsAuthBackendRole to impo
The id of the existing AwsAuthBackendRole that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#import import section} in the documentation of this resource for the id to use
---
@@ -1998,7 +1998,7 @@ AwsAuthBackendRoleConfig.builder()
| boundSubnetIds
| java.util.List
| Only EC2 instances associated with this subnet ID will be permitted to log in. |
| boundVpcIds
| java.util.List
| Only EC2 instances associated with this VPC ID will be permitted to log in. |
| disallowReauthentication
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| When true, only allows a single token to be granted per instance ID. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#id AwsAuthBackendRole#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#id AwsAuthBackendRole#id}. |
| inferredAwsRegion
| java.lang.String
| The region to search for the inferred entities in. |
| inferredEntityType
| java.lang.String
| The type of inferencing Vault should do. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
@@ -2096,7 +2096,7 @@ public java.lang.String getRole();
Name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#role AwsAuthBackendRole#role}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#role AwsAuthBackendRole#role}
---
@@ -2110,7 +2110,7 @@ public java.lang.Object getAllowInstanceMigration();
When true, allows migration of the underlying instance where the client resides. Use with caution.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#allow_instance_migration AwsAuthBackendRole#allow_instance_migration}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#allow_instance_migration AwsAuthBackendRole#allow_instance_migration}
---
@@ -2124,7 +2124,7 @@ public java.lang.String getAuthType();
The auth type permitted for this role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#auth_type AwsAuthBackendRole#auth_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#auth_type AwsAuthBackendRole#auth_type}
---
@@ -2138,7 +2138,7 @@ public java.lang.String getBackend();
Unique name of the auth backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#backend AwsAuthBackendRole#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#backend AwsAuthBackendRole#backend}
---
@@ -2152,7 +2152,7 @@ public java.util.List getBoundAccountIds();
Only EC2 instances with this account ID in their identity document will be permitted to log in.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_account_ids AwsAuthBackendRole#bound_account_ids}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_account_ids AwsAuthBackendRole#bound_account_ids}
---
@@ -2166,7 +2166,7 @@ public java.util.List getBoundAmiIds();
Only EC2 instances using this AMI ID will be permitted to log in.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_ami_ids AwsAuthBackendRole#bound_ami_ids}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_ami_ids AwsAuthBackendRole#bound_ami_ids}
---
@@ -2180,7 +2180,7 @@ public java.util.List getBoundEc2InstanceIds();
Only EC2 instances that match this instance ID will be permitted to log in.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_ec2_instance_ids AwsAuthBackendRole#bound_ec2_instance_ids}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_ec2_instance_ids AwsAuthBackendRole#bound_ec2_instance_ids}
---
@@ -2194,7 +2194,7 @@ public java.util.List getBoundIamInstanceProfileArns();
Only EC2 instances associated with an IAM instance profile ARN that matches this value will be permitted to log in.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_iam_instance_profile_arns AwsAuthBackendRole#bound_iam_instance_profile_arns}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_iam_instance_profile_arns AwsAuthBackendRole#bound_iam_instance_profile_arns}
---
@@ -2208,7 +2208,7 @@ public java.util.List getBoundIamPrincipalArns();
The IAM principal that must be authenticated using the iam auth method.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_iam_principal_arns AwsAuthBackendRole#bound_iam_principal_arns}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_iam_principal_arns AwsAuthBackendRole#bound_iam_principal_arns}
---
@@ -2222,7 +2222,7 @@ public java.util.List getBoundIamRoleArns();
Only EC2 instances that match this IAM role ARN will be permitted to log in.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_iam_role_arns AwsAuthBackendRole#bound_iam_role_arns}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_iam_role_arns AwsAuthBackendRole#bound_iam_role_arns}
---
@@ -2236,7 +2236,7 @@ public java.util.List getBoundRegions();
Only EC2 instances in this region will be permitted to log in.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_regions AwsAuthBackendRole#bound_regions}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_regions AwsAuthBackendRole#bound_regions}
---
@@ -2250,7 +2250,7 @@ public java.util.List getBoundSubnetIds();
Only EC2 instances associated with this subnet ID will be permitted to log in.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_subnet_ids AwsAuthBackendRole#bound_subnet_ids}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_subnet_ids AwsAuthBackendRole#bound_subnet_ids}
---
@@ -2264,7 +2264,7 @@ public java.util.List getBoundVpcIds();
Only EC2 instances associated with this VPC ID will be permitted to log in.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_vpc_ids AwsAuthBackendRole#bound_vpc_ids}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_vpc_ids AwsAuthBackendRole#bound_vpc_ids}
---
@@ -2278,7 +2278,7 @@ public java.lang.Object getDisallowReauthentication();
When true, only allows a single token to be granted per instance ID.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#disallow_reauthentication AwsAuthBackendRole#disallow_reauthentication}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#disallow_reauthentication AwsAuthBackendRole#disallow_reauthentication}
---
@@ -2290,7 +2290,7 @@ public java.lang.String getId();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#id AwsAuthBackendRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#id AwsAuthBackendRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -2307,7 +2307,7 @@ public java.lang.String getInferredAwsRegion();
The region to search for the inferred entities in.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#inferred_aws_region AwsAuthBackendRole#inferred_aws_region}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#inferred_aws_region AwsAuthBackendRole#inferred_aws_region}
---
@@ -2321,7 +2321,7 @@ public java.lang.String getInferredEntityType();
The type of inferencing Vault should do.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#inferred_entity_type AwsAuthBackendRole#inferred_entity_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#inferred_entity_type AwsAuthBackendRole#inferred_entity_type}
---
@@ -2335,7 +2335,7 @@ public java.lang.String getNamespace();
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#namespace AwsAuthBackendRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#namespace AwsAuthBackendRole#namespace}
---
@@ -2351,7 +2351,7 @@ Whether or not Vault should resolve the bound_iam_principal_arn to an AWS Unique
When true, deleting a principal and recreating it with the same name won't automatically grant the new principal the same roles in Vault that the old principal had.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#resolve_aws_unique_ids AwsAuthBackendRole#resolve_aws_unique_ids}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#resolve_aws_unique_ids AwsAuthBackendRole#resolve_aws_unique_ids}
---
@@ -2365,7 +2365,7 @@ public java.lang.String getRoleTag();
The key of the tag on EC2 instance to use for role tags.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#role_tag AwsAuthBackendRole#role_tag}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#role_tag AwsAuthBackendRole#role_tag}
---
@@ -2379,7 +2379,7 @@ public java.util.List getTokenBoundCidrs();
Specifies the blocks of IP addresses which are allowed to use the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_bound_cidrs AwsAuthBackendRole#token_bound_cidrs}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_bound_cidrs AwsAuthBackendRole#token_bound_cidrs}
---
@@ -2393,7 +2393,7 @@ public java.lang.Number getTokenExplicitMaxTtl();
Generated Token's Explicit Maximum TTL in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_explicit_max_ttl AwsAuthBackendRole#token_explicit_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_explicit_max_ttl AwsAuthBackendRole#token_explicit_max_ttl}
---
@@ -2407,7 +2407,7 @@ public java.lang.Number getTokenMaxTtl();
The maximum lifetime of the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_max_ttl AwsAuthBackendRole#token_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_max_ttl AwsAuthBackendRole#token_max_ttl}
---
@@ -2421,7 +2421,7 @@ public java.lang.Object getTokenNoDefaultPolicy();
If true, the 'default' policy will not automatically be added to generated tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_no_default_policy AwsAuthBackendRole#token_no_default_policy}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_no_default_policy AwsAuthBackendRole#token_no_default_policy}
---
@@ -2435,7 +2435,7 @@ public java.lang.Number getTokenNumUses();
The maximum number of times a token may be used, a value of zero means unlimited.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_num_uses AwsAuthBackendRole#token_num_uses}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_num_uses AwsAuthBackendRole#token_num_uses}
---
@@ -2449,7 +2449,7 @@ public java.lang.Number getTokenPeriod();
Generated Token's Period.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_period AwsAuthBackendRole#token_period}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_period AwsAuthBackendRole#token_period}
---
@@ -2463,7 +2463,7 @@ public java.util.List getTokenPolicies();
Generated Token's Policies.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_policies AwsAuthBackendRole#token_policies}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_policies AwsAuthBackendRole#token_policies}
---
@@ -2477,7 +2477,7 @@ public java.lang.Number getTokenTtl();
The initial ttl of the token to generate in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_ttl AwsAuthBackendRole#token_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_ttl AwsAuthBackendRole#token_ttl}
---
@@ -2491,7 +2491,7 @@ public java.lang.String getTokenType();
The type of token to generate, service or batch.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_type AwsAuthBackendRole#token_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_type AwsAuthBackendRole#token_type}
---
diff --git a/docs/awsAuthBackendRole.python.md b/docs/awsAuthBackendRole.python.md
index fef8a3ec..c354746a 100644
--- a/docs/awsAuthBackendRole.python.md
+++ b/docs/awsAuthBackendRole.python.md
@@ -4,7 +4,7 @@
### AwsAuthBackendRole
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role vault_aws_auth_backend_role}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role vault_aws_auth_backend_role}.
#### Initializers
@@ -78,7 +78,7 @@ awsAuthBackendRole.AwsAuthBackendRole(
| bound_subnet_ids
| typing.List[str]
| Only EC2 instances associated with this subnet ID will be permitted to log in. |
| bound_vpc_ids
| typing.List[str]
| Only EC2 instances associated with this VPC ID will be permitted to log in. |
| disallow_reauthentication
| typing.Union[bool, cdktf.IResolvable]
| When true, only allows a single token to be granted per instance ID. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#id AwsAuthBackendRole#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#id AwsAuthBackendRole#id}. |
| inferred_aws_region
| str
| The region to search for the inferred entities in. |
| inferred_entity_type
| str
| The type of inferencing Vault should do. |
| namespace
| str
| Target namespace. (requires Enterprise). |
@@ -162,7 +162,7 @@ Must be unique amongst siblings in the same scope
Name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#role AwsAuthBackendRole#role}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#role AwsAuthBackendRole#role}
---
@@ -172,7 +172,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
When true, allows migration of the underlying instance where the client resides. Use with caution.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#allow_instance_migration AwsAuthBackendRole#allow_instance_migration}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#allow_instance_migration AwsAuthBackendRole#allow_instance_migration}
---
@@ -182,7 +182,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The auth type permitted for this role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#auth_type AwsAuthBackendRole#auth_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#auth_type AwsAuthBackendRole#auth_type}
---
@@ -192,7 +192,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Unique name of the auth backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#backend AwsAuthBackendRole#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#backend AwsAuthBackendRole#backend}
---
@@ -202,7 +202,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Only EC2 instances with this account ID in their identity document will be permitted to log in.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_account_ids AwsAuthBackendRole#bound_account_ids}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_account_ids AwsAuthBackendRole#bound_account_ids}
---
@@ -212,7 +212,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Only EC2 instances using this AMI ID will be permitted to log in.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_ami_ids AwsAuthBackendRole#bound_ami_ids}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_ami_ids AwsAuthBackendRole#bound_ami_ids}
---
@@ -222,7 +222,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Only EC2 instances that match this instance ID will be permitted to log in.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_ec2_instance_ids AwsAuthBackendRole#bound_ec2_instance_ids}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_ec2_instance_ids AwsAuthBackendRole#bound_ec2_instance_ids}
---
@@ -232,7 +232,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Only EC2 instances associated with an IAM instance profile ARN that matches this value will be permitted to log in.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_iam_instance_profile_arns AwsAuthBackendRole#bound_iam_instance_profile_arns}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_iam_instance_profile_arns AwsAuthBackendRole#bound_iam_instance_profile_arns}
---
@@ -242,7 +242,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The IAM principal that must be authenticated using the iam auth method.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_iam_principal_arns AwsAuthBackendRole#bound_iam_principal_arns}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_iam_principal_arns AwsAuthBackendRole#bound_iam_principal_arns}
---
@@ -252,7 +252,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Only EC2 instances that match this IAM role ARN will be permitted to log in.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_iam_role_arns AwsAuthBackendRole#bound_iam_role_arns}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_iam_role_arns AwsAuthBackendRole#bound_iam_role_arns}
---
@@ -262,7 +262,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Only EC2 instances in this region will be permitted to log in.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_regions AwsAuthBackendRole#bound_regions}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_regions AwsAuthBackendRole#bound_regions}
---
@@ -272,7 +272,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Only EC2 instances associated with this subnet ID will be permitted to log in.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_subnet_ids AwsAuthBackendRole#bound_subnet_ids}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_subnet_ids AwsAuthBackendRole#bound_subnet_ids}
---
@@ -282,7 +282,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Only EC2 instances associated with this VPC ID will be permitted to log in.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_vpc_ids AwsAuthBackendRole#bound_vpc_ids}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_vpc_ids AwsAuthBackendRole#bound_vpc_ids}
---
@@ -292,7 +292,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
When true, only allows a single token to be granted per instance ID.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#disallow_reauthentication AwsAuthBackendRole#disallow_reauthentication}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#disallow_reauthentication AwsAuthBackendRole#disallow_reauthentication}
---
@@ -300,7 +300,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#id AwsAuthBackendRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#id AwsAuthBackendRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -313,7 +313,7 @@ If you experience problems setting this value it might not be settable. Please t
The region to search for the inferred entities in.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#inferred_aws_region AwsAuthBackendRole#inferred_aws_region}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#inferred_aws_region AwsAuthBackendRole#inferred_aws_region}
---
@@ -323,7 +323,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The type of inferencing Vault should do.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#inferred_entity_type AwsAuthBackendRole#inferred_entity_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#inferred_entity_type AwsAuthBackendRole#inferred_entity_type}
---
@@ -333,7 +333,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#namespace AwsAuthBackendRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#namespace AwsAuthBackendRole#namespace}
---
@@ -345,7 +345,7 @@ Whether or not Vault should resolve the bound_iam_principal_arn to an AWS Unique
When true, deleting a principal and recreating it with the same name won't automatically grant the new principal the same roles in Vault that the old principal had.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#resolve_aws_unique_ids AwsAuthBackendRole#resolve_aws_unique_ids}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#resolve_aws_unique_ids AwsAuthBackendRole#resolve_aws_unique_ids}
---
@@ -355,7 +355,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The key of the tag on EC2 instance to use for role tags.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#role_tag AwsAuthBackendRole#role_tag}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#role_tag AwsAuthBackendRole#role_tag}
---
@@ -365,7 +365,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Specifies the blocks of IP addresses which are allowed to use the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_bound_cidrs AwsAuthBackendRole#token_bound_cidrs}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_bound_cidrs AwsAuthBackendRole#token_bound_cidrs}
---
@@ -375,7 +375,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Generated Token's Explicit Maximum TTL in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_explicit_max_ttl AwsAuthBackendRole#token_explicit_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_explicit_max_ttl AwsAuthBackendRole#token_explicit_max_ttl}
---
@@ -385,7 +385,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The maximum lifetime of the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_max_ttl AwsAuthBackendRole#token_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_max_ttl AwsAuthBackendRole#token_max_ttl}
---
@@ -395,7 +395,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
If true, the 'default' policy will not automatically be added to generated tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_no_default_policy AwsAuthBackendRole#token_no_default_policy}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_no_default_policy AwsAuthBackendRole#token_no_default_policy}
---
@@ -405,7 +405,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The maximum number of times a token may be used, a value of zero means unlimited.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_num_uses AwsAuthBackendRole#token_num_uses}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_num_uses AwsAuthBackendRole#token_num_uses}
---
@@ -415,7 +415,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Generated Token's Period.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_period AwsAuthBackendRole#token_period}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_period AwsAuthBackendRole#token_period}
---
@@ -425,7 +425,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Generated Token's Policies.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_policies AwsAuthBackendRole#token_policies}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_policies AwsAuthBackendRole#token_policies}
---
@@ -435,7 +435,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The initial ttl of the token to generate in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_ttl AwsAuthBackendRole#token_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_ttl AwsAuthBackendRole#token_ttl}
---
@@ -445,7 +445,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The type of token to generate, service or batch.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_type AwsAuthBackendRole#token_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_type AwsAuthBackendRole#token_type}
---
@@ -1114,7 +1114,7 @@ The construct id used in the generated config for the AwsAuthBackendRole to impo
The id of the existing AwsAuthBackendRole that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#import import section} in the documentation of this resource for the id to use
---
@@ -2030,7 +2030,7 @@ awsAuthBackendRole.AwsAuthBackendRoleConfig(
| bound_subnet_ids
| typing.List[str]
| Only EC2 instances associated with this subnet ID will be permitted to log in. |
| bound_vpc_ids
| typing.List[str]
| Only EC2 instances associated with this VPC ID will be permitted to log in. |
| disallow_reauthentication
| typing.Union[bool, cdktf.IResolvable]
| When true, only allows a single token to be granted per instance ID. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#id AwsAuthBackendRole#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#id AwsAuthBackendRole#id}. |
| inferred_aws_region
| str
| The region to search for the inferred entities in. |
| inferred_entity_type
| str
| The type of inferencing Vault should do. |
| namespace
| str
| Target namespace. (requires Enterprise). |
@@ -2128,7 +2128,7 @@ role: str
Name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#role AwsAuthBackendRole#role}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#role AwsAuthBackendRole#role}
---
@@ -2142,7 +2142,7 @@ allow_instance_migration: typing.Union[bool, IResolvable]
When true, allows migration of the underlying instance where the client resides. Use with caution.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#allow_instance_migration AwsAuthBackendRole#allow_instance_migration}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#allow_instance_migration AwsAuthBackendRole#allow_instance_migration}
---
@@ -2156,7 +2156,7 @@ auth_type: str
The auth type permitted for this role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#auth_type AwsAuthBackendRole#auth_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#auth_type AwsAuthBackendRole#auth_type}
---
@@ -2170,7 +2170,7 @@ backend: str
Unique name of the auth backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#backend AwsAuthBackendRole#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#backend AwsAuthBackendRole#backend}
---
@@ -2184,7 +2184,7 @@ bound_account_ids: typing.List[str]
Only EC2 instances with this account ID in their identity document will be permitted to log in.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_account_ids AwsAuthBackendRole#bound_account_ids}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_account_ids AwsAuthBackendRole#bound_account_ids}
---
@@ -2198,7 +2198,7 @@ bound_ami_ids: typing.List[str]
Only EC2 instances using this AMI ID will be permitted to log in.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_ami_ids AwsAuthBackendRole#bound_ami_ids}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_ami_ids AwsAuthBackendRole#bound_ami_ids}
---
@@ -2212,7 +2212,7 @@ bound_ec2_instance_ids: typing.List[str]
Only EC2 instances that match this instance ID will be permitted to log in.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_ec2_instance_ids AwsAuthBackendRole#bound_ec2_instance_ids}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_ec2_instance_ids AwsAuthBackendRole#bound_ec2_instance_ids}
---
@@ -2226,7 +2226,7 @@ bound_iam_instance_profile_arns: typing.List[str]
Only EC2 instances associated with an IAM instance profile ARN that matches this value will be permitted to log in.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_iam_instance_profile_arns AwsAuthBackendRole#bound_iam_instance_profile_arns}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_iam_instance_profile_arns AwsAuthBackendRole#bound_iam_instance_profile_arns}
---
@@ -2240,7 +2240,7 @@ bound_iam_principal_arns: typing.List[str]
The IAM principal that must be authenticated using the iam auth method.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_iam_principal_arns AwsAuthBackendRole#bound_iam_principal_arns}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_iam_principal_arns AwsAuthBackendRole#bound_iam_principal_arns}
---
@@ -2254,7 +2254,7 @@ bound_iam_role_arns: typing.List[str]
Only EC2 instances that match this IAM role ARN will be permitted to log in.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_iam_role_arns AwsAuthBackendRole#bound_iam_role_arns}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_iam_role_arns AwsAuthBackendRole#bound_iam_role_arns}
---
@@ -2268,7 +2268,7 @@ bound_regions: typing.List[str]
Only EC2 instances in this region will be permitted to log in.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_regions AwsAuthBackendRole#bound_regions}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_regions AwsAuthBackendRole#bound_regions}
---
@@ -2282,7 +2282,7 @@ bound_subnet_ids: typing.List[str]
Only EC2 instances associated with this subnet ID will be permitted to log in.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_subnet_ids AwsAuthBackendRole#bound_subnet_ids}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_subnet_ids AwsAuthBackendRole#bound_subnet_ids}
---
@@ -2296,7 +2296,7 @@ bound_vpc_ids: typing.List[str]
Only EC2 instances associated with this VPC ID will be permitted to log in.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_vpc_ids AwsAuthBackendRole#bound_vpc_ids}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_vpc_ids AwsAuthBackendRole#bound_vpc_ids}
---
@@ -2310,7 +2310,7 @@ disallow_reauthentication: typing.Union[bool, IResolvable]
When true, only allows a single token to be granted per instance ID.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#disallow_reauthentication AwsAuthBackendRole#disallow_reauthentication}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#disallow_reauthentication AwsAuthBackendRole#disallow_reauthentication}
---
@@ -2322,7 +2322,7 @@ id: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#id AwsAuthBackendRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#id AwsAuthBackendRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -2339,7 +2339,7 @@ inferred_aws_region: str
The region to search for the inferred entities in.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#inferred_aws_region AwsAuthBackendRole#inferred_aws_region}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#inferred_aws_region AwsAuthBackendRole#inferred_aws_region}
---
@@ -2353,7 +2353,7 @@ inferred_entity_type: str
The type of inferencing Vault should do.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#inferred_entity_type AwsAuthBackendRole#inferred_entity_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#inferred_entity_type AwsAuthBackendRole#inferred_entity_type}
---
@@ -2367,7 +2367,7 @@ namespace: str
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#namespace AwsAuthBackendRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#namespace AwsAuthBackendRole#namespace}
---
@@ -2383,7 +2383,7 @@ Whether or not Vault should resolve the bound_iam_principal_arn to an AWS Unique
When true, deleting a principal and recreating it with the same name won't automatically grant the new principal the same roles in Vault that the old principal had.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#resolve_aws_unique_ids AwsAuthBackendRole#resolve_aws_unique_ids}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#resolve_aws_unique_ids AwsAuthBackendRole#resolve_aws_unique_ids}
---
@@ -2397,7 +2397,7 @@ role_tag: str
The key of the tag on EC2 instance to use for role tags.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#role_tag AwsAuthBackendRole#role_tag}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#role_tag AwsAuthBackendRole#role_tag}
---
@@ -2411,7 +2411,7 @@ token_bound_cidrs: typing.List[str]
Specifies the blocks of IP addresses which are allowed to use the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_bound_cidrs AwsAuthBackendRole#token_bound_cidrs}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_bound_cidrs AwsAuthBackendRole#token_bound_cidrs}
---
@@ -2425,7 +2425,7 @@ token_explicit_max_ttl: typing.Union[int, float]
Generated Token's Explicit Maximum TTL in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_explicit_max_ttl AwsAuthBackendRole#token_explicit_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_explicit_max_ttl AwsAuthBackendRole#token_explicit_max_ttl}
---
@@ -2439,7 +2439,7 @@ token_max_ttl: typing.Union[int, float]
The maximum lifetime of the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_max_ttl AwsAuthBackendRole#token_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_max_ttl AwsAuthBackendRole#token_max_ttl}
---
@@ -2453,7 +2453,7 @@ token_no_default_policy: typing.Union[bool, IResolvable]
If true, the 'default' policy will not automatically be added to generated tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_no_default_policy AwsAuthBackendRole#token_no_default_policy}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_no_default_policy AwsAuthBackendRole#token_no_default_policy}
---
@@ -2467,7 +2467,7 @@ token_num_uses: typing.Union[int, float]
The maximum number of times a token may be used, a value of zero means unlimited.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_num_uses AwsAuthBackendRole#token_num_uses}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_num_uses AwsAuthBackendRole#token_num_uses}
---
@@ -2481,7 +2481,7 @@ token_period: typing.Union[int, float]
Generated Token's Period.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_period AwsAuthBackendRole#token_period}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_period AwsAuthBackendRole#token_period}
---
@@ -2495,7 +2495,7 @@ token_policies: typing.List[str]
Generated Token's Policies.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_policies AwsAuthBackendRole#token_policies}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_policies AwsAuthBackendRole#token_policies}
---
@@ -2509,7 +2509,7 @@ token_ttl: typing.Union[int, float]
The initial ttl of the token to generate in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_ttl AwsAuthBackendRole#token_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_ttl AwsAuthBackendRole#token_ttl}
---
@@ -2523,7 +2523,7 @@ token_type: str
The type of token to generate, service or batch.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_type AwsAuthBackendRole#token_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_type AwsAuthBackendRole#token_type}
---
diff --git a/docs/awsAuthBackendRole.typescript.md b/docs/awsAuthBackendRole.typescript.md
index 3d5e0195..a3f034ea 100644
--- a/docs/awsAuthBackendRole.typescript.md
+++ b/docs/awsAuthBackendRole.typescript.md
@@ -4,7 +4,7 @@
### AwsAuthBackendRole
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role vault_aws_auth_backend_role}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role vault_aws_auth_backend_role}.
#### Initializers
@@ -663,7 +663,7 @@ The construct id used in the generated config for the AwsAuthBackendRole to impo
The id of the existing AwsAuthBackendRole that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#import import section} in the documentation of this resource for the id to use
---
@@ -1542,7 +1542,7 @@ const awsAuthBackendRoleConfig: awsAuthBackendRole.AwsAuthBackendRoleConfig = {
| boundSubnetIds
| string[]
| Only EC2 instances associated with this subnet ID will be permitted to log in. |
| boundVpcIds
| string[]
| Only EC2 instances associated with this VPC ID will be permitted to log in. |
| disallowReauthentication
| boolean \| cdktf.IResolvable
| When true, only allows a single token to be granted per instance ID. |
-| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#id AwsAuthBackendRole#id}. |
+| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#id AwsAuthBackendRole#id}. |
| inferredAwsRegion
| string
| The region to search for the inferred entities in. |
| inferredEntityType
| string
| The type of inferencing Vault should do. |
| namespace
| string
| Target namespace. (requires Enterprise). |
@@ -1640,7 +1640,7 @@ public readonly role: string;
Name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#role AwsAuthBackendRole#role}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#role AwsAuthBackendRole#role}
---
@@ -1654,7 +1654,7 @@ public readonly allowInstanceMigration: boolean | IResolvable;
When true, allows migration of the underlying instance where the client resides. Use with caution.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#allow_instance_migration AwsAuthBackendRole#allow_instance_migration}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#allow_instance_migration AwsAuthBackendRole#allow_instance_migration}
---
@@ -1668,7 +1668,7 @@ public readonly authType: string;
The auth type permitted for this role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#auth_type AwsAuthBackendRole#auth_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#auth_type AwsAuthBackendRole#auth_type}
---
@@ -1682,7 +1682,7 @@ public readonly backend: string;
Unique name of the auth backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#backend AwsAuthBackendRole#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#backend AwsAuthBackendRole#backend}
---
@@ -1696,7 +1696,7 @@ public readonly boundAccountIds: string[];
Only EC2 instances with this account ID in their identity document will be permitted to log in.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_account_ids AwsAuthBackendRole#bound_account_ids}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_account_ids AwsAuthBackendRole#bound_account_ids}
---
@@ -1710,7 +1710,7 @@ public readonly boundAmiIds: string[];
Only EC2 instances using this AMI ID will be permitted to log in.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_ami_ids AwsAuthBackendRole#bound_ami_ids}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_ami_ids AwsAuthBackendRole#bound_ami_ids}
---
@@ -1724,7 +1724,7 @@ public readonly boundEc2InstanceIds: string[];
Only EC2 instances that match this instance ID will be permitted to log in.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_ec2_instance_ids AwsAuthBackendRole#bound_ec2_instance_ids}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_ec2_instance_ids AwsAuthBackendRole#bound_ec2_instance_ids}
---
@@ -1738,7 +1738,7 @@ public readonly boundIamInstanceProfileArns: string[];
Only EC2 instances associated with an IAM instance profile ARN that matches this value will be permitted to log in.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_iam_instance_profile_arns AwsAuthBackendRole#bound_iam_instance_profile_arns}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_iam_instance_profile_arns AwsAuthBackendRole#bound_iam_instance_profile_arns}
---
@@ -1752,7 +1752,7 @@ public readonly boundIamPrincipalArns: string[];
The IAM principal that must be authenticated using the iam auth method.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_iam_principal_arns AwsAuthBackendRole#bound_iam_principal_arns}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_iam_principal_arns AwsAuthBackendRole#bound_iam_principal_arns}
---
@@ -1766,7 +1766,7 @@ public readonly boundIamRoleArns: string[];
Only EC2 instances that match this IAM role ARN will be permitted to log in.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_iam_role_arns AwsAuthBackendRole#bound_iam_role_arns}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_iam_role_arns AwsAuthBackendRole#bound_iam_role_arns}
---
@@ -1780,7 +1780,7 @@ public readonly boundRegions: string[];
Only EC2 instances in this region will be permitted to log in.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_regions AwsAuthBackendRole#bound_regions}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_regions AwsAuthBackendRole#bound_regions}
---
@@ -1794,7 +1794,7 @@ public readonly boundSubnetIds: string[];
Only EC2 instances associated with this subnet ID will be permitted to log in.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_subnet_ids AwsAuthBackendRole#bound_subnet_ids}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_subnet_ids AwsAuthBackendRole#bound_subnet_ids}
---
@@ -1808,7 +1808,7 @@ public readonly boundVpcIds: string[];
Only EC2 instances associated with this VPC ID will be permitted to log in.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_vpc_ids AwsAuthBackendRole#bound_vpc_ids}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_vpc_ids AwsAuthBackendRole#bound_vpc_ids}
---
@@ -1822,7 +1822,7 @@ public readonly disallowReauthentication: boolean | IResolvable;
When true, only allows a single token to be granted per instance ID.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#disallow_reauthentication AwsAuthBackendRole#disallow_reauthentication}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#disallow_reauthentication AwsAuthBackendRole#disallow_reauthentication}
---
@@ -1834,7 +1834,7 @@ public readonly id: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#id AwsAuthBackendRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#id AwsAuthBackendRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1851,7 +1851,7 @@ public readonly inferredAwsRegion: string;
The region to search for the inferred entities in.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#inferred_aws_region AwsAuthBackendRole#inferred_aws_region}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#inferred_aws_region AwsAuthBackendRole#inferred_aws_region}
---
@@ -1865,7 +1865,7 @@ public readonly inferredEntityType: string;
The type of inferencing Vault should do.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#inferred_entity_type AwsAuthBackendRole#inferred_entity_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#inferred_entity_type AwsAuthBackendRole#inferred_entity_type}
---
@@ -1879,7 +1879,7 @@ public readonly namespace: string;
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#namespace AwsAuthBackendRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#namespace AwsAuthBackendRole#namespace}
---
@@ -1895,7 +1895,7 @@ Whether or not Vault should resolve the bound_iam_principal_arn to an AWS Unique
When true, deleting a principal and recreating it with the same name won't automatically grant the new principal the same roles in Vault that the old principal had.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#resolve_aws_unique_ids AwsAuthBackendRole#resolve_aws_unique_ids}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#resolve_aws_unique_ids AwsAuthBackendRole#resolve_aws_unique_ids}
---
@@ -1909,7 +1909,7 @@ public readonly roleTag: string;
The key of the tag on EC2 instance to use for role tags.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#role_tag AwsAuthBackendRole#role_tag}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#role_tag AwsAuthBackendRole#role_tag}
---
@@ -1923,7 +1923,7 @@ public readonly tokenBoundCidrs: string[];
Specifies the blocks of IP addresses which are allowed to use the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_bound_cidrs AwsAuthBackendRole#token_bound_cidrs}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_bound_cidrs AwsAuthBackendRole#token_bound_cidrs}
---
@@ -1937,7 +1937,7 @@ public readonly tokenExplicitMaxTtl: number;
Generated Token's Explicit Maximum TTL in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_explicit_max_ttl AwsAuthBackendRole#token_explicit_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_explicit_max_ttl AwsAuthBackendRole#token_explicit_max_ttl}
---
@@ -1951,7 +1951,7 @@ public readonly tokenMaxTtl: number;
The maximum lifetime of the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_max_ttl AwsAuthBackendRole#token_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_max_ttl AwsAuthBackendRole#token_max_ttl}
---
@@ -1965,7 +1965,7 @@ public readonly tokenNoDefaultPolicy: boolean | IResolvable;
If true, the 'default' policy will not automatically be added to generated tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_no_default_policy AwsAuthBackendRole#token_no_default_policy}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_no_default_policy AwsAuthBackendRole#token_no_default_policy}
---
@@ -1979,7 +1979,7 @@ public readonly tokenNumUses: number;
The maximum number of times a token may be used, a value of zero means unlimited.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_num_uses AwsAuthBackendRole#token_num_uses}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_num_uses AwsAuthBackendRole#token_num_uses}
---
@@ -1993,7 +1993,7 @@ public readonly tokenPeriod: number;
Generated Token's Period.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_period AwsAuthBackendRole#token_period}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_period AwsAuthBackendRole#token_period}
---
@@ -2007,7 +2007,7 @@ public readonly tokenPolicies: string[];
Generated Token's Policies.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_policies AwsAuthBackendRole#token_policies}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_policies AwsAuthBackendRole#token_policies}
---
@@ -2021,7 +2021,7 @@ public readonly tokenTtl: number;
The initial ttl of the token to generate in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_ttl AwsAuthBackendRole#token_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_ttl AwsAuthBackendRole#token_ttl}
---
@@ -2035,7 +2035,7 @@ public readonly tokenType: string;
The type of token to generate, service or batch.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_type AwsAuthBackendRole#token_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_type AwsAuthBackendRole#token_type}
---
diff --git a/docs/awsAuthBackendRoleTag.csharp.md b/docs/awsAuthBackendRoleTag.csharp.md
index d85794fd..1012d8b8 100644
--- a/docs/awsAuthBackendRoleTag.csharp.md
+++ b/docs/awsAuthBackendRoleTag.csharp.md
@@ -4,7 +4,7 @@
### AwsAuthBackendRoleTag
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag vault_aws_auth_backend_role_tag}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag vault_aws_auth_backend_role_tag}.
#### Initializers
@@ -523,7 +523,7 @@ The construct id used in the generated config for the AwsAuthBackendRoleTag to i
The id of the existing AwsAuthBackendRoleTag that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#import import section} in the documentation of this resource for the id to use
---
@@ -980,7 +980,7 @@ new AwsAuthBackendRoleTagConfig {
| AllowInstanceMigration
| object
| Allows migration of the underlying instance where the client resides. |
| Backend
| string
| AWS auth backend to read tags from. |
| DisallowReauthentication
| object
| Only allow a single token to be granted per instance ID. |
-| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#id AwsAuthBackendRoleTag#id}. |
+| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#id AwsAuthBackendRoleTag#id}. |
| InstanceId
| string
| Instance ID for which this tag is intended. |
| MaxTtl
| string
| The maximum allowed lifetime of tokens issued using this role. |
| Namespace
| string
| Target namespace. (requires Enterprise). |
@@ -1068,7 +1068,7 @@ public string Role { get; set; }
Name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#role AwsAuthBackendRoleTag#role}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#role AwsAuthBackendRoleTag#role}
---
@@ -1082,7 +1082,7 @@ public object AllowInstanceMigration { get; set; }
Allows migration of the underlying instance where the client resides.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#allow_instance_migration AwsAuthBackendRoleTag#allow_instance_migration}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#allow_instance_migration AwsAuthBackendRoleTag#allow_instance_migration}
---
@@ -1096,7 +1096,7 @@ public string Backend { get; set; }
AWS auth backend to read tags from.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#backend AwsAuthBackendRoleTag#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#backend AwsAuthBackendRoleTag#backend}
---
@@ -1110,7 +1110,7 @@ public object DisallowReauthentication { get; set; }
Only allow a single token to be granted per instance ID.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#disallow_reauthentication AwsAuthBackendRoleTag#disallow_reauthentication}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#disallow_reauthentication AwsAuthBackendRoleTag#disallow_reauthentication}
---
@@ -1122,7 +1122,7 @@ public string Id { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#id AwsAuthBackendRoleTag#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#id AwsAuthBackendRoleTag#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1141,7 +1141,7 @@ Instance ID for which this tag is intended.
The created tag can only be used by the instance with the given ID.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#instance_id AwsAuthBackendRoleTag#instance_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#instance_id AwsAuthBackendRoleTag#instance_id}
---
@@ -1155,7 +1155,7 @@ public string MaxTtl { get; set; }
The maximum allowed lifetime of tokens issued using this role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#max_ttl AwsAuthBackendRoleTag#max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#max_ttl AwsAuthBackendRoleTag#max_ttl}
---
@@ -1169,7 +1169,7 @@ public string Namespace { get; set; }
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#namespace AwsAuthBackendRoleTag#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#namespace AwsAuthBackendRoleTag#namespace}
---
@@ -1183,7 +1183,7 @@ public string[] Policies { get; set; }
Policies to be associated with the tag.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#policies AwsAuthBackendRoleTag#policies}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#policies AwsAuthBackendRoleTag#policies}
---
diff --git a/docs/awsAuthBackendRoleTag.go.md b/docs/awsAuthBackendRoleTag.go.md
index 34c26482..e197ecb1 100644
--- a/docs/awsAuthBackendRoleTag.go.md
+++ b/docs/awsAuthBackendRoleTag.go.md
@@ -4,7 +4,7 @@
### AwsAuthBackendRoleTag
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag vault_aws_auth_backend_role_tag}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag vault_aws_auth_backend_role_tag}.
#### Initializers
@@ -523,7 +523,7 @@ The construct id used in the generated config for the AwsAuthBackendRoleTag to i
The id of the existing AwsAuthBackendRoleTag that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#import import section} in the documentation of this resource for the id to use
---
@@ -980,7 +980,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/awsauthbackendroletag
| AllowInstanceMigration
| interface{}
| Allows migration of the underlying instance where the client resides. |
| Backend
| *string
| AWS auth backend to read tags from. |
| DisallowReauthentication
| interface{}
| Only allow a single token to be granted per instance ID. |
-| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#id AwsAuthBackendRoleTag#id}. |
+| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#id AwsAuthBackendRoleTag#id}. |
| InstanceId
| *string
| Instance ID for which this tag is intended. |
| MaxTtl
| *string
| The maximum allowed lifetime of tokens issued using this role. |
| Namespace
| *string
| Target namespace. (requires Enterprise). |
@@ -1068,7 +1068,7 @@ Role *string
Name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#role AwsAuthBackendRoleTag#role}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#role AwsAuthBackendRoleTag#role}
---
@@ -1082,7 +1082,7 @@ AllowInstanceMigration interface{}
Allows migration of the underlying instance where the client resides.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#allow_instance_migration AwsAuthBackendRoleTag#allow_instance_migration}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#allow_instance_migration AwsAuthBackendRoleTag#allow_instance_migration}
---
@@ -1096,7 +1096,7 @@ Backend *string
AWS auth backend to read tags from.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#backend AwsAuthBackendRoleTag#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#backend AwsAuthBackendRoleTag#backend}
---
@@ -1110,7 +1110,7 @@ DisallowReauthentication interface{}
Only allow a single token to be granted per instance ID.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#disallow_reauthentication AwsAuthBackendRoleTag#disallow_reauthentication}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#disallow_reauthentication AwsAuthBackendRoleTag#disallow_reauthentication}
---
@@ -1122,7 +1122,7 @@ Id *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#id AwsAuthBackendRoleTag#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#id AwsAuthBackendRoleTag#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1141,7 +1141,7 @@ Instance ID for which this tag is intended.
The created tag can only be used by the instance with the given ID.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#instance_id AwsAuthBackendRoleTag#instance_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#instance_id AwsAuthBackendRoleTag#instance_id}
---
@@ -1155,7 +1155,7 @@ MaxTtl *string
The maximum allowed lifetime of tokens issued using this role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#max_ttl AwsAuthBackendRoleTag#max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#max_ttl AwsAuthBackendRoleTag#max_ttl}
---
@@ -1169,7 +1169,7 @@ Namespace *string
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#namespace AwsAuthBackendRoleTag#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#namespace AwsAuthBackendRoleTag#namespace}
---
@@ -1183,7 +1183,7 @@ Policies *[]*string
Policies to be associated with the tag.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#policies AwsAuthBackendRoleTag#policies}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#policies AwsAuthBackendRoleTag#policies}
---
diff --git a/docs/awsAuthBackendRoleTag.java.md b/docs/awsAuthBackendRoleTag.java.md
index 8f16dd92..5fee6279 100644
--- a/docs/awsAuthBackendRoleTag.java.md
+++ b/docs/awsAuthBackendRoleTag.java.md
@@ -4,7 +4,7 @@
### AwsAuthBackendRoleTag
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag vault_aws_auth_backend_role_tag}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag vault_aws_auth_backend_role_tag}.
#### Initializers
@@ -52,7 +52,7 @@ AwsAuthBackendRoleTag.Builder.create(Construct scope, java.lang.String id)
| allowInstanceMigration
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| Allows migration of the underlying instance where the client resides. |
| backend
| java.lang.String
| AWS auth backend to read tags from. |
| disallowReauthentication
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| Only allow a single token to be granted per instance ID. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#id AwsAuthBackendRoleTag#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#id AwsAuthBackendRoleTag#id}. |
| instanceId
| java.lang.String
| Instance ID for which this tag is intended. |
| maxTtl
| java.lang.String
| The maximum allowed lifetime of tokens issued using this role. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
@@ -126,7 +126,7 @@ Must be unique amongst siblings in the same scope
Name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#role AwsAuthBackendRoleTag#role}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#role AwsAuthBackendRoleTag#role}
---
@@ -136,7 +136,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Allows migration of the underlying instance where the client resides.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#allow_instance_migration AwsAuthBackendRoleTag#allow_instance_migration}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#allow_instance_migration AwsAuthBackendRoleTag#allow_instance_migration}
---
@@ -146,7 +146,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
AWS auth backend to read tags from.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#backend AwsAuthBackendRoleTag#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#backend AwsAuthBackendRoleTag#backend}
---
@@ -156,7 +156,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Only allow a single token to be granted per instance ID.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#disallow_reauthentication AwsAuthBackendRoleTag#disallow_reauthentication}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#disallow_reauthentication AwsAuthBackendRoleTag#disallow_reauthentication}
---
@@ -164,7 +164,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#id AwsAuthBackendRoleTag#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#id AwsAuthBackendRoleTag#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -179,7 +179,7 @@ Instance ID for which this tag is intended.
The created tag can only be used by the instance with the given ID.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#instance_id AwsAuthBackendRoleTag#instance_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#instance_id AwsAuthBackendRoleTag#instance_id}
---
@@ -189,7 +189,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The maximum allowed lifetime of tokens issued using this role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#max_ttl AwsAuthBackendRoleTag#max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#max_ttl AwsAuthBackendRoleTag#max_ttl}
---
@@ -199,7 +199,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#namespace AwsAuthBackendRoleTag#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#namespace AwsAuthBackendRoleTag#namespace}
---
@@ -209,7 +209,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Policies to be associated with the tag.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#policies AwsAuthBackendRoleTag#policies}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#policies AwsAuthBackendRoleTag#policies}
---
@@ -692,7 +692,7 @@ The construct id used in the generated config for the AwsAuthBackendRoleTag to i
The id of the existing AwsAuthBackendRoleTag that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#import import section} in the documentation of this resource for the id to use
---
@@ -1155,7 +1155,7 @@ AwsAuthBackendRoleTagConfig.builder()
| allowInstanceMigration
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| Allows migration of the underlying instance where the client resides. |
| backend
| java.lang.String
| AWS auth backend to read tags from. |
| disallowReauthentication
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| Only allow a single token to be granted per instance ID. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#id AwsAuthBackendRoleTag#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#id AwsAuthBackendRoleTag#id}. |
| instanceId
| java.lang.String
| Instance ID for which this tag is intended. |
| maxTtl
| java.lang.String
| The maximum allowed lifetime of tokens issued using this role. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
@@ -1243,7 +1243,7 @@ public java.lang.String getRole();
Name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#role AwsAuthBackendRoleTag#role}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#role AwsAuthBackendRoleTag#role}
---
@@ -1257,7 +1257,7 @@ public java.lang.Object getAllowInstanceMigration();
Allows migration of the underlying instance where the client resides.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#allow_instance_migration AwsAuthBackendRoleTag#allow_instance_migration}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#allow_instance_migration AwsAuthBackendRoleTag#allow_instance_migration}
---
@@ -1271,7 +1271,7 @@ public java.lang.String getBackend();
AWS auth backend to read tags from.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#backend AwsAuthBackendRoleTag#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#backend AwsAuthBackendRoleTag#backend}
---
@@ -1285,7 +1285,7 @@ public java.lang.Object getDisallowReauthentication();
Only allow a single token to be granted per instance ID.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#disallow_reauthentication AwsAuthBackendRoleTag#disallow_reauthentication}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#disallow_reauthentication AwsAuthBackendRoleTag#disallow_reauthentication}
---
@@ -1297,7 +1297,7 @@ public java.lang.String getId();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#id AwsAuthBackendRoleTag#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#id AwsAuthBackendRoleTag#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1316,7 +1316,7 @@ Instance ID for which this tag is intended.
The created tag can only be used by the instance with the given ID.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#instance_id AwsAuthBackendRoleTag#instance_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#instance_id AwsAuthBackendRoleTag#instance_id}
---
@@ -1330,7 +1330,7 @@ public java.lang.String getMaxTtl();
The maximum allowed lifetime of tokens issued using this role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#max_ttl AwsAuthBackendRoleTag#max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#max_ttl AwsAuthBackendRoleTag#max_ttl}
---
@@ -1344,7 +1344,7 @@ public java.lang.String getNamespace();
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#namespace AwsAuthBackendRoleTag#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#namespace AwsAuthBackendRoleTag#namespace}
---
@@ -1358,7 +1358,7 @@ public java.util.List getPolicies();
Policies to be associated with the tag.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#policies AwsAuthBackendRoleTag#policies}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#policies AwsAuthBackendRoleTag#policies}
---
diff --git a/docs/awsAuthBackendRoleTag.python.md b/docs/awsAuthBackendRoleTag.python.md
index 77b34f02..a58761ae 100644
--- a/docs/awsAuthBackendRoleTag.python.md
+++ b/docs/awsAuthBackendRoleTag.python.md
@@ -4,7 +4,7 @@
### AwsAuthBackendRoleTag
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag vault_aws_auth_backend_role_tag}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag vault_aws_auth_backend_role_tag}.
#### Initializers
@@ -48,7 +48,7 @@ awsAuthBackendRoleTag.AwsAuthBackendRoleTag(
| allow_instance_migration
| typing.Union[bool, cdktf.IResolvable]
| Allows migration of the underlying instance where the client resides. |
| backend
| str
| AWS auth backend to read tags from. |
| disallow_reauthentication
| typing.Union[bool, cdktf.IResolvable]
| Only allow a single token to be granted per instance ID. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#id AwsAuthBackendRoleTag#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#id AwsAuthBackendRoleTag#id}. |
| instance_id
| str
| Instance ID for which this tag is intended. |
| max_ttl
| str
| The maximum allowed lifetime of tokens issued using this role. |
| namespace
| str
| Target namespace. (requires Enterprise). |
@@ -122,7 +122,7 @@ Must be unique amongst siblings in the same scope
Name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#role AwsAuthBackendRoleTag#role}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#role AwsAuthBackendRoleTag#role}
---
@@ -132,7 +132,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Allows migration of the underlying instance where the client resides.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#allow_instance_migration AwsAuthBackendRoleTag#allow_instance_migration}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#allow_instance_migration AwsAuthBackendRoleTag#allow_instance_migration}
---
@@ -142,7 +142,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
AWS auth backend to read tags from.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#backend AwsAuthBackendRoleTag#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#backend AwsAuthBackendRoleTag#backend}
---
@@ -152,7 +152,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Only allow a single token to be granted per instance ID.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#disallow_reauthentication AwsAuthBackendRoleTag#disallow_reauthentication}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#disallow_reauthentication AwsAuthBackendRoleTag#disallow_reauthentication}
---
@@ -160,7 +160,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#id AwsAuthBackendRoleTag#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#id AwsAuthBackendRoleTag#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -175,7 +175,7 @@ Instance ID for which this tag is intended.
The created tag can only be used by the instance with the given ID.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#instance_id AwsAuthBackendRoleTag#instance_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#instance_id AwsAuthBackendRoleTag#instance_id}
---
@@ -185,7 +185,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The maximum allowed lifetime of tokens issued using this role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#max_ttl AwsAuthBackendRoleTag#max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#max_ttl AwsAuthBackendRoleTag#max_ttl}
---
@@ -195,7 +195,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#namespace AwsAuthBackendRoleTag#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#namespace AwsAuthBackendRoleTag#namespace}
---
@@ -205,7 +205,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Policies to be associated with the tag.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#policies AwsAuthBackendRoleTag#policies}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#policies AwsAuthBackendRoleTag#policies}
---
@@ -734,7 +734,7 @@ The construct id used in the generated config for the AwsAuthBackendRoleTag to i
The id of the existing AwsAuthBackendRoleTag that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#import import section} in the documentation of this resource for the id to use
---
@@ -1191,7 +1191,7 @@ awsAuthBackendRoleTag.AwsAuthBackendRoleTagConfig(
| allow_instance_migration
| typing.Union[bool, cdktf.IResolvable]
| Allows migration of the underlying instance where the client resides. |
| backend
| str
| AWS auth backend to read tags from. |
| disallow_reauthentication
| typing.Union[bool, cdktf.IResolvable]
| Only allow a single token to be granted per instance ID. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#id AwsAuthBackendRoleTag#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#id AwsAuthBackendRoleTag#id}. |
| instance_id
| str
| Instance ID for which this tag is intended. |
| max_ttl
| str
| The maximum allowed lifetime of tokens issued using this role. |
| namespace
| str
| Target namespace. (requires Enterprise). |
@@ -1279,7 +1279,7 @@ role: str
Name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#role AwsAuthBackendRoleTag#role}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#role AwsAuthBackendRoleTag#role}
---
@@ -1293,7 +1293,7 @@ allow_instance_migration: typing.Union[bool, IResolvable]
Allows migration of the underlying instance where the client resides.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#allow_instance_migration AwsAuthBackendRoleTag#allow_instance_migration}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#allow_instance_migration AwsAuthBackendRoleTag#allow_instance_migration}
---
@@ -1307,7 +1307,7 @@ backend: str
AWS auth backend to read tags from.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#backend AwsAuthBackendRoleTag#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#backend AwsAuthBackendRoleTag#backend}
---
@@ -1321,7 +1321,7 @@ disallow_reauthentication: typing.Union[bool, IResolvable]
Only allow a single token to be granted per instance ID.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#disallow_reauthentication AwsAuthBackendRoleTag#disallow_reauthentication}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#disallow_reauthentication AwsAuthBackendRoleTag#disallow_reauthentication}
---
@@ -1333,7 +1333,7 @@ id: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#id AwsAuthBackendRoleTag#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#id AwsAuthBackendRoleTag#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1352,7 +1352,7 @@ Instance ID for which this tag is intended.
The created tag can only be used by the instance with the given ID.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#instance_id AwsAuthBackendRoleTag#instance_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#instance_id AwsAuthBackendRoleTag#instance_id}
---
@@ -1366,7 +1366,7 @@ max_ttl: str
The maximum allowed lifetime of tokens issued using this role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#max_ttl AwsAuthBackendRoleTag#max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#max_ttl AwsAuthBackendRoleTag#max_ttl}
---
@@ -1380,7 +1380,7 @@ namespace: str
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#namespace AwsAuthBackendRoleTag#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#namespace AwsAuthBackendRoleTag#namespace}
---
@@ -1394,7 +1394,7 @@ policies: typing.List[str]
Policies to be associated with the tag.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#policies AwsAuthBackendRoleTag#policies}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#policies AwsAuthBackendRoleTag#policies}
---
diff --git a/docs/awsAuthBackendRoleTag.typescript.md b/docs/awsAuthBackendRoleTag.typescript.md
index 6f64f17f..aa6af2e5 100644
--- a/docs/awsAuthBackendRoleTag.typescript.md
+++ b/docs/awsAuthBackendRoleTag.typescript.md
@@ -4,7 +4,7 @@
### AwsAuthBackendRoleTag
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag vault_aws_auth_backend_role_tag}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag vault_aws_auth_backend_role_tag}.
#### Initializers
@@ -523,7 +523,7 @@ The construct id used in the generated config for the AwsAuthBackendRoleTag to i
The id of the existing AwsAuthBackendRoleTag that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#import import section} in the documentation of this resource for the id to use
---
@@ -963,7 +963,7 @@ const awsAuthBackendRoleTagConfig: awsAuthBackendRoleTag.AwsAuthBackendRoleTagCo
| allowInstanceMigration
| boolean \| cdktf.IResolvable
| Allows migration of the underlying instance where the client resides. |
| backend
| string
| AWS auth backend to read tags from. |
| disallowReauthentication
| boolean \| cdktf.IResolvable
| Only allow a single token to be granted per instance ID. |
-| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#id AwsAuthBackendRoleTag#id}. |
+| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#id AwsAuthBackendRoleTag#id}. |
| instanceId
| string
| Instance ID for which this tag is intended. |
| maxTtl
| string
| The maximum allowed lifetime of tokens issued using this role. |
| namespace
| string
| Target namespace. (requires Enterprise). |
@@ -1051,7 +1051,7 @@ public readonly role: string;
Name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#role AwsAuthBackendRoleTag#role}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#role AwsAuthBackendRoleTag#role}
---
@@ -1065,7 +1065,7 @@ public readonly allowInstanceMigration: boolean | IResolvable;
Allows migration of the underlying instance where the client resides.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#allow_instance_migration AwsAuthBackendRoleTag#allow_instance_migration}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#allow_instance_migration AwsAuthBackendRoleTag#allow_instance_migration}
---
@@ -1079,7 +1079,7 @@ public readonly backend: string;
AWS auth backend to read tags from.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#backend AwsAuthBackendRoleTag#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#backend AwsAuthBackendRoleTag#backend}
---
@@ -1093,7 +1093,7 @@ public readonly disallowReauthentication: boolean | IResolvable;
Only allow a single token to be granted per instance ID.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#disallow_reauthentication AwsAuthBackendRoleTag#disallow_reauthentication}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#disallow_reauthentication AwsAuthBackendRoleTag#disallow_reauthentication}
---
@@ -1105,7 +1105,7 @@ public readonly id: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#id AwsAuthBackendRoleTag#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#id AwsAuthBackendRoleTag#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1124,7 +1124,7 @@ Instance ID for which this tag is intended.
The created tag can only be used by the instance with the given ID.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#instance_id AwsAuthBackendRoleTag#instance_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#instance_id AwsAuthBackendRoleTag#instance_id}
---
@@ -1138,7 +1138,7 @@ public readonly maxTtl: string;
The maximum allowed lifetime of tokens issued using this role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#max_ttl AwsAuthBackendRoleTag#max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#max_ttl AwsAuthBackendRoleTag#max_ttl}
---
@@ -1152,7 +1152,7 @@ public readonly namespace: string;
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#namespace AwsAuthBackendRoleTag#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#namespace AwsAuthBackendRoleTag#namespace}
---
@@ -1166,7 +1166,7 @@ public readonly policies: string[];
Policies to be associated with the tag.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#policies AwsAuthBackendRoleTag#policies}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#policies AwsAuthBackendRoleTag#policies}
---
diff --git a/docs/awsAuthBackendRoletagBlacklist.csharp.md b/docs/awsAuthBackendRoletagBlacklist.csharp.md
index e585555e..5f7e4b71 100644
--- a/docs/awsAuthBackendRoletagBlacklist.csharp.md
+++ b/docs/awsAuthBackendRoletagBlacklist.csharp.md
@@ -4,7 +4,7 @@
### AwsAuthBackendRoletagBlacklist
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_roletag_blacklist vault_aws_auth_backend_roletag_blacklist}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_roletag_blacklist vault_aws_auth_backend_roletag_blacklist}.
#### Initializers
@@ -495,7 +495,7 @@ The construct id used in the generated config for the AwsAuthBackendRoletagBlack
The id of the existing AwsAuthBackendRoletagBlacklist that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_roletag_blacklist#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_roletag_blacklist#import import section} in the documentation of this resource for the id to use
---
@@ -836,7 +836,7 @@ new AwsAuthBackendRoletagBlacklistConfig {
| Provisioners
| object[]
| *No description.* |
| Backend
| string
| Unique name of the auth backend to configure. |
| DisablePeriodicTidy
| object
| If true, disables the periodic tidying of the roletag blacklist entries. |
-| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_roletag_blacklist#id AwsAuthBackendRoletagBlacklist#id}. |
+| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_roletag_blacklist#id AwsAuthBackendRoletagBlacklist#id}. |
| Namespace
| string
| Target namespace. (requires Enterprise). |
| SafetyBuffer
| double
| The amount of extra time that must have passed beyond the roletag expiration, before it's removed from backend storage. |
@@ -922,7 +922,7 @@ public string Backend { get; set; }
Unique name of the auth backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_roletag_blacklist#backend AwsAuthBackendRoletagBlacklist#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_roletag_blacklist#backend AwsAuthBackendRoletagBlacklist#backend}
---
@@ -936,7 +936,7 @@ public object DisablePeriodicTidy { get; set; }
If true, disables the periodic tidying of the roletag blacklist entries.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_roletag_blacklist#disable_periodic_tidy AwsAuthBackendRoletagBlacklist#disable_periodic_tidy}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_roletag_blacklist#disable_periodic_tidy AwsAuthBackendRoletagBlacklist#disable_periodic_tidy}
---
@@ -948,7 +948,7 @@ public string Id { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_roletag_blacklist#id AwsAuthBackendRoletagBlacklist#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_roletag_blacklist#id AwsAuthBackendRoletagBlacklist#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -965,7 +965,7 @@ public string Namespace { get; set; }
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_roletag_blacklist#namespace AwsAuthBackendRoletagBlacklist#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_roletag_blacklist#namespace AwsAuthBackendRoletagBlacklist#namespace}
---
@@ -979,7 +979,7 @@ public double SafetyBuffer { get; set; }
The amount of extra time that must have passed beyond the roletag expiration, before it's removed from backend storage.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_roletag_blacklist#safety_buffer AwsAuthBackendRoletagBlacklist#safety_buffer}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_roletag_blacklist#safety_buffer AwsAuthBackendRoletagBlacklist#safety_buffer}
---
diff --git a/docs/awsAuthBackendRoletagBlacklist.go.md b/docs/awsAuthBackendRoletagBlacklist.go.md
index b5924ff9..a7277e7f 100644
--- a/docs/awsAuthBackendRoletagBlacklist.go.md
+++ b/docs/awsAuthBackendRoletagBlacklist.go.md
@@ -4,7 +4,7 @@
### AwsAuthBackendRoletagBlacklist
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_roletag_blacklist vault_aws_auth_backend_roletag_blacklist}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_roletag_blacklist vault_aws_auth_backend_roletag_blacklist}.
#### Initializers
@@ -495,7 +495,7 @@ The construct id used in the generated config for the AwsAuthBackendRoletagBlack
The id of the existing AwsAuthBackendRoletagBlacklist that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_roletag_blacklist#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_roletag_blacklist#import import section} in the documentation of this resource for the id to use
---
@@ -836,7 +836,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/awsauthbackendroletag
| Provisioners
| *[]interface{}
| *No description.* |
| Backend
| *string
| Unique name of the auth backend to configure. |
| DisablePeriodicTidy
| interface{}
| If true, disables the periodic tidying of the roletag blacklist entries. |
-| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_roletag_blacklist#id AwsAuthBackendRoletagBlacklist#id}. |
+| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_roletag_blacklist#id AwsAuthBackendRoletagBlacklist#id}. |
| Namespace
| *string
| Target namespace. (requires Enterprise). |
| SafetyBuffer
| *f64
| The amount of extra time that must have passed beyond the roletag expiration, before it's removed from backend storage. |
@@ -922,7 +922,7 @@ Backend *string
Unique name of the auth backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_roletag_blacklist#backend AwsAuthBackendRoletagBlacklist#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_roletag_blacklist#backend AwsAuthBackendRoletagBlacklist#backend}
---
@@ -936,7 +936,7 @@ DisablePeriodicTidy interface{}
If true, disables the periodic tidying of the roletag blacklist entries.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_roletag_blacklist#disable_periodic_tidy AwsAuthBackendRoletagBlacklist#disable_periodic_tidy}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_roletag_blacklist#disable_periodic_tidy AwsAuthBackendRoletagBlacklist#disable_periodic_tidy}
---
@@ -948,7 +948,7 @@ Id *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_roletag_blacklist#id AwsAuthBackendRoletagBlacklist#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_roletag_blacklist#id AwsAuthBackendRoletagBlacklist#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -965,7 +965,7 @@ Namespace *string
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_roletag_blacklist#namespace AwsAuthBackendRoletagBlacklist#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_roletag_blacklist#namespace AwsAuthBackendRoletagBlacklist#namespace}
---
@@ -979,7 +979,7 @@ SafetyBuffer *f64
The amount of extra time that must have passed beyond the roletag expiration, before it's removed from backend storage.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_roletag_blacklist#safety_buffer AwsAuthBackendRoletagBlacklist#safety_buffer}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_roletag_blacklist#safety_buffer AwsAuthBackendRoletagBlacklist#safety_buffer}
---
diff --git a/docs/awsAuthBackendRoletagBlacklist.java.md b/docs/awsAuthBackendRoletagBlacklist.java.md
index b21450d7..8b2e0bfb 100644
--- a/docs/awsAuthBackendRoletagBlacklist.java.md
+++ b/docs/awsAuthBackendRoletagBlacklist.java.md
@@ -4,7 +4,7 @@
### AwsAuthBackendRoletagBlacklist
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_roletag_blacklist vault_aws_auth_backend_roletag_blacklist}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_roletag_blacklist vault_aws_auth_backend_roletag_blacklist}.
#### Initializers
@@ -45,7 +45,7 @@ AwsAuthBackendRoletagBlacklist.Builder.create(Construct scope, java.lang.String
| provisioners
| java.util.List
| *No description.* |
| backend
| java.lang.String
| Unique name of the auth backend to configure. |
| disablePeriodicTidy
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| If true, disables the periodic tidying of the roletag blacklist entries. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_roletag_blacklist#id AwsAuthBackendRoletagBlacklist#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_roletag_blacklist#id AwsAuthBackendRoletagBlacklist#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
| safetyBuffer
| java.lang.Number
| The amount of extra time that must have passed beyond the roletag expiration, before it's removed from backend storage. |
@@ -117,7 +117,7 @@ Must be unique amongst siblings in the same scope
Unique name of the auth backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_roletag_blacklist#backend AwsAuthBackendRoletagBlacklist#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_roletag_blacklist#backend AwsAuthBackendRoletagBlacklist#backend}
---
@@ -127,7 +127,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
If true, disables the periodic tidying of the roletag blacklist entries.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_roletag_blacklist#disable_periodic_tidy AwsAuthBackendRoletagBlacklist#disable_periodic_tidy}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_roletag_blacklist#disable_periodic_tidy AwsAuthBackendRoletagBlacklist#disable_periodic_tidy}
---
@@ -135,7 +135,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_roletag_blacklist#id AwsAuthBackendRoletagBlacklist#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_roletag_blacklist#id AwsAuthBackendRoletagBlacklist#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -148,7 +148,7 @@ If you experience problems setting this value it might not be settable. Please t
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_roletag_blacklist#namespace AwsAuthBackendRoletagBlacklist#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_roletag_blacklist#namespace AwsAuthBackendRoletagBlacklist#namespace}
---
@@ -158,7 +158,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The amount of extra time that must have passed beyond the roletag expiration, before it's removed from backend storage.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_roletag_blacklist#safety_buffer AwsAuthBackendRoletagBlacklist#safety_buffer}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_roletag_blacklist#safety_buffer AwsAuthBackendRoletagBlacklist#safety_buffer}
---
@@ -613,7 +613,7 @@ The construct id used in the generated config for the AwsAuthBackendRoletagBlack
The id of the existing AwsAuthBackendRoletagBlacklist that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_roletag_blacklist#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_roletag_blacklist#import import section} in the documentation of this resource for the id to use
---
@@ -959,7 +959,7 @@ AwsAuthBackendRoletagBlacklistConfig.builder()
| provisioners
| java.util.List
| *No description.* |
| backend
| java.lang.String
| Unique name of the auth backend to configure. |
| disablePeriodicTidy
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| If true, disables the periodic tidying of the roletag blacklist entries. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_roletag_blacklist#id AwsAuthBackendRoletagBlacklist#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_roletag_blacklist#id AwsAuthBackendRoletagBlacklist#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
| safetyBuffer
| java.lang.Number
| The amount of extra time that must have passed beyond the roletag expiration, before it's removed from backend storage. |
@@ -1045,7 +1045,7 @@ public java.lang.String getBackend();
Unique name of the auth backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_roletag_blacklist#backend AwsAuthBackendRoletagBlacklist#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_roletag_blacklist#backend AwsAuthBackendRoletagBlacklist#backend}
---
@@ -1059,7 +1059,7 @@ public java.lang.Object getDisablePeriodicTidy();
If true, disables the periodic tidying of the roletag blacklist entries.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_roletag_blacklist#disable_periodic_tidy AwsAuthBackendRoletagBlacklist#disable_periodic_tidy}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_roletag_blacklist#disable_periodic_tidy AwsAuthBackendRoletagBlacklist#disable_periodic_tidy}
---
@@ -1071,7 +1071,7 @@ public java.lang.String getId();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_roletag_blacklist#id AwsAuthBackendRoletagBlacklist#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_roletag_blacklist#id AwsAuthBackendRoletagBlacklist#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1088,7 +1088,7 @@ public java.lang.String getNamespace();
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_roletag_blacklist#namespace AwsAuthBackendRoletagBlacklist#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_roletag_blacklist#namespace AwsAuthBackendRoletagBlacklist#namespace}
---
@@ -1102,7 +1102,7 @@ public java.lang.Number getSafetyBuffer();
The amount of extra time that must have passed beyond the roletag expiration, before it's removed from backend storage.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_roletag_blacklist#safety_buffer AwsAuthBackendRoletagBlacklist#safety_buffer}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_roletag_blacklist#safety_buffer AwsAuthBackendRoletagBlacklist#safety_buffer}
---
diff --git a/docs/awsAuthBackendRoletagBlacklist.python.md b/docs/awsAuthBackendRoletagBlacklist.python.md
index adb0ead6..20e6a574 100644
--- a/docs/awsAuthBackendRoletagBlacklist.python.md
+++ b/docs/awsAuthBackendRoletagBlacklist.python.md
@@ -4,7 +4,7 @@
### AwsAuthBackendRoletagBlacklist
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_roletag_blacklist vault_aws_auth_backend_roletag_blacklist}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_roletag_blacklist vault_aws_auth_backend_roletag_blacklist}.
#### Initializers
@@ -42,7 +42,7 @@ awsAuthBackendRoletagBlacklist.AwsAuthBackendRoletagBlacklist(
| provisioners
| typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]]
| *No description.* |
| backend
| str
| Unique name of the auth backend to configure. |
| disable_periodic_tidy
| typing.Union[bool, cdktf.IResolvable]
| If true, disables the periodic tidying of the roletag blacklist entries. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_roletag_blacklist#id AwsAuthBackendRoletagBlacklist#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_roletag_blacklist#id AwsAuthBackendRoletagBlacklist#id}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
| safety_buffer
| typing.Union[int, float]
| The amount of extra time that must have passed beyond the roletag expiration, before it's removed from backend storage. |
@@ -114,7 +114,7 @@ Must be unique amongst siblings in the same scope
Unique name of the auth backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_roletag_blacklist#backend AwsAuthBackendRoletagBlacklist#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_roletag_blacklist#backend AwsAuthBackendRoletagBlacklist#backend}
---
@@ -124,7 +124,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
If true, disables the periodic tidying of the roletag blacklist entries.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_roletag_blacklist#disable_periodic_tidy AwsAuthBackendRoletagBlacklist#disable_periodic_tidy}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_roletag_blacklist#disable_periodic_tidy AwsAuthBackendRoletagBlacklist#disable_periodic_tidy}
---
@@ -132,7 +132,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_roletag_blacklist#id AwsAuthBackendRoletagBlacklist#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_roletag_blacklist#id AwsAuthBackendRoletagBlacklist#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -145,7 +145,7 @@ If you experience problems setting this value it might not be settable. Please t
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_roletag_blacklist#namespace AwsAuthBackendRoletagBlacklist#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_roletag_blacklist#namespace AwsAuthBackendRoletagBlacklist#namespace}
---
@@ -155,7 +155,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The amount of extra time that must have passed beyond the roletag expiration, before it's removed from backend storage.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_roletag_blacklist#safety_buffer AwsAuthBackendRoletagBlacklist#safety_buffer}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_roletag_blacklist#safety_buffer AwsAuthBackendRoletagBlacklist#safety_buffer}
---
@@ -656,7 +656,7 @@ The construct id used in the generated config for the AwsAuthBackendRoletagBlack
The id of the existing AwsAuthBackendRoletagBlacklist that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_roletag_blacklist#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_roletag_blacklist#import import section} in the documentation of this resource for the id to use
---
@@ -997,7 +997,7 @@ awsAuthBackendRoletagBlacklist.AwsAuthBackendRoletagBlacklistConfig(
| provisioners
| typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]]
| *No description.* |
| backend
| str
| Unique name of the auth backend to configure. |
| disable_periodic_tidy
| typing.Union[bool, cdktf.IResolvable]
| If true, disables the periodic tidying of the roletag blacklist entries. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_roletag_blacklist#id AwsAuthBackendRoletagBlacklist#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_roletag_blacklist#id AwsAuthBackendRoletagBlacklist#id}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
| safety_buffer
| typing.Union[int, float]
| The amount of extra time that must have passed beyond the roletag expiration, before it's removed from backend storage. |
@@ -1083,7 +1083,7 @@ backend: str
Unique name of the auth backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_roletag_blacklist#backend AwsAuthBackendRoletagBlacklist#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_roletag_blacklist#backend AwsAuthBackendRoletagBlacklist#backend}
---
@@ -1097,7 +1097,7 @@ disable_periodic_tidy: typing.Union[bool, IResolvable]
If true, disables the periodic tidying of the roletag blacklist entries.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_roletag_blacklist#disable_periodic_tidy AwsAuthBackendRoletagBlacklist#disable_periodic_tidy}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_roletag_blacklist#disable_periodic_tidy AwsAuthBackendRoletagBlacklist#disable_periodic_tidy}
---
@@ -1109,7 +1109,7 @@ id: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_roletag_blacklist#id AwsAuthBackendRoletagBlacklist#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_roletag_blacklist#id AwsAuthBackendRoletagBlacklist#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1126,7 +1126,7 @@ namespace: str
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_roletag_blacklist#namespace AwsAuthBackendRoletagBlacklist#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_roletag_blacklist#namespace AwsAuthBackendRoletagBlacklist#namespace}
---
@@ -1140,7 +1140,7 @@ safety_buffer: typing.Union[int, float]
The amount of extra time that must have passed beyond the roletag expiration, before it's removed from backend storage.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_roletag_blacklist#safety_buffer AwsAuthBackendRoletagBlacklist#safety_buffer}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_roletag_blacklist#safety_buffer AwsAuthBackendRoletagBlacklist#safety_buffer}
---
diff --git a/docs/awsAuthBackendRoletagBlacklist.typescript.md b/docs/awsAuthBackendRoletagBlacklist.typescript.md
index b5cdf33d..c5395d0c 100644
--- a/docs/awsAuthBackendRoletagBlacklist.typescript.md
+++ b/docs/awsAuthBackendRoletagBlacklist.typescript.md
@@ -4,7 +4,7 @@
### AwsAuthBackendRoletagBlacklist
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_roletag_blacklist vault_aws_auth_backend_roletag_blacklist}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_roletag_blacklist vault_aws_auth_backend_roletag_blacklist}.
#### Initializers
@@ -495,7 +495,7 @@ The construct id used in the generated config for the AwsAuthBackendRoletagBlack
The id of the existing AwsAuthBackendRoletagBlacklist that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_roletag_blacklist#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_roletag_blacklist#import import section} in the documentation of this resource for the id to use
---
@@ -823,7 +823,7 @@ const awsAuthBackendRoletagBlacklistConfig: awsAuthBackendRoletagBlacklist.AwsAu
| provisioners
| cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[]
| *No description.* |
| backend
| string
| Unique name of the auth backend to configure. |
| disablePeriodicTidy
| boolean \| cdktf.IResolvable
| If true, disables the periodic tidying of the roletag blacklist entries. |
-| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_roletag_blacklist#id AwsAuthBackendRoletagBlacklist#id}. |
+| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_roletag_blacklist#id AwsAuthBackendRoletagBlacklist#id}. |
| namespace
| string
| Target namespace. (requires Enterprise). |
| safetyBuffer
| number
| The amount of extra time that must have passed beyond the roletag expiration, before it's removed from backend storage. |
@@ -909,7 +909,7 @@ public readonly backend: string;
Unique name of the auth backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_roletag_blacklist#backend AwsAuthBackendRoletagBlacklist#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_roletag_blacklist#backend AwsAuthBackendRoletagBlacklist#backend}
---
@@ -923,7 +923,7 @@ public readonly disablePeriodicTidy: boolean | IResolvable;
If true, disables the periodic tidying of the roletag blacklist entries.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_roletag_blacklist#disable_periodic_tidy AwsAuthBackendRoletagBlacklist#disable_periodic_tidy}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_roletag_blacklist#disable_periodic_tidy AwsAuthBackendRoletagBlacklist#disable_periodic_tidy}
---
@@ -935,7 +935,7 @@ public readonly id: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_roletag_blacklist#id AwsAuthBackendRoletagBlacklist#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_roletag_blacklist#id AwsAuthBackendRoletagBlacklist#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -952,7 +952,7 @@ public readonly namespace: string;
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_roletag_blacklist#namespace AwsAuthBackendRoletagBlacklist#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_roletag_blacklist#namespace AwsAuthBackendRoletagBlacklist#namespace}
---
@@ -966,7 +966,7 @@ public readonly safetyBuffer: number;
The amount of extra time that must have passed beyond the roletag expiration, before it's removed from backend storage.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_roletag_blacklist#safety_buffer AwsAuthBackendRoletagBlacklist#safety_buffer}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_roletag_blacklist#safety_buffer AwsAuthBackendRoletagBlacklist#safety_buffer}
---
diff --git a/docs/awsAuthBackendStsRole.csharp.md b/docs/awsAuthBackendStsRole.csharp.md
index d166c008..0efa48e8 100644
--- a/docs/awsAuthBackendStsRole.csharp.md
+++ b/docs/awsAuthBackendStsRole.csharp.md
@@ -4,7 +4,7 @@
### AwsAuthBackendStsRole
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_sts_role vault_aws_auth_backend_sts_role}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_sts_role vault_aws_auth_backend_sts_role}.
#### Initializers
@@ -488,7 +488,7 @@ The construct id used in the generated config for the AwsAuthBackendStsRole to i
The id of the existing AwsAuthBackendStsRole that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_sts_role#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_sts_role#import import section} in the documentation of this resource for the id to use
---
@@ -830,7 +830,7 @@ new AwsAuthBackendStsRoleConfig {
| AccountId
| string
| AWS account ID to be associated with STS role. |
| StsRole
| string
| AWS ARN for STS role to be assumed when interacting with the account specified. |
| Backend
| string
| Unique name of the auth backend to configure. |
-| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_sts_role#id AwsAuthBackendStsRole#id}. |
+| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_sts_role#id AwsAuthBackendStsRole#id}. |
| Namespace
| string
| Target namespace. (requires Enterprise). |
---
@@ -915,7 +915,7 @@ public string AccountId { get; set; }
AWS account ID to be associated with STS role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_sts_role#account_id AwsAuthBackendStsRole#account_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_sts_role#account_id AwsAuthBackendStsRole#account_id}
---
@@ -929,7 +929,7 @@ public string StsRole { get; set; }
AWS ARN for STS role to be assumed when interacting with the account specified.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_sts_role#sts_role AwsAuthBackendStsRole#sts_role}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_sts_role#sts_role AwsAuthBackendStsRole#sts_role}
---
@@ -943,7 +943,7 @@ public string Backend { get; set; }
Unique name of the auth backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_sts_role#backend AwsAuthBackendStsRole#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_sts_role#backend AwsAuthBackendStsRole#backend}
---
@@ -955,7 +955,7 @@ public string Id { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_sts_role#id AwsAuthBackendStsRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_sts_role#id AwsAuthBackendStsRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -972,7 +972,7 @@ public string Namespace { get; set; }
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_sts_role#namespace AwsAuthBackendStsRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_sts_role#namespace AwsAuthBackendStsRole#namespace}
---
diff --git a/docs/awsAuthBackendStsRole.go.md b/docs/awsAuthBackendStsRole.go.md
index d57818fc..d80099be 100644
--- a/docs/awsAuthBackendStsRole.go.md
+++ b/docs/awsAuthBackendStsRole.go.md
@@ -4,7 +4,7 @@
### AwsAuthBackendStsRole
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_sts_role vault_aws_auth_backend_sts_role}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_sts_role vault_aws_auth_backend_sts_role}.
#### Initializers
@@ -488,7 +488,7 @@ The construct id used in the generated config for the AwsAuthBackendStsRole to i
The id of the existing AwsAuthBackendStsRole that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_sts_role#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_sts_role#import import section} in the documentation of this resource for the id to use
---
@@ -830,7 +830,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/awsauthbackendstsrole
| AccountId
| *string
| AWS account ID to be associated with STS role. |
| StsRole
| *string
| AWS ARN for STS role to be assumed when interacting with the account specified. |
| Backend
| *string
| Unique name of the auth backend to configure. |
-| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_sts_role#id AwsAuthBackendStsRole#id}. |
+| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_sts_role#id AwsAuthBackendStsRole#id}. |
| Namespace
| *string
| Target namespace. (requires Enterprise). |
---
@@ -915,7 +915,7 @@ AccountId *string
AWS account ID to be associated with STS role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_sts_role#account_id AwsAuthBackendStsRole#account_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_sts_role#account_id AwsAuthBackendStsRole#account_id}
---
@@ -929,7 +929,7 @@ StsRole *string
AWS ARN for STS role to be assumed when interacting with the account specified.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_sts_role#sts_role AwsAuthBackendStsRole#sts_role}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_sts_role#sts_role AwsAuthBackendStsRole#sts_role}
---
@@ -943,7 +943,7 @@ Backend *string
Unique name of the auth backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_sts_role#backend AwsAuthBackendStsRole#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_sts_role#backend AwsAuthBackendStsRole#backend}
---
@@ -955,7 +955,7 @@ Id *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_sts_role#id AwsAuthBackendStsRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_sts_role#id AwsAuthBackendStsRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -972,7 +972,7 @@ Namespace *string
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_sts_role#namespace AwsAuthBackendStsRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_sts_role#namespace AwsAuthBackendStsRole#namespace}
---
diff --git a/docs/awsAuthBackendStsRole.java.md b/docs/awsAuthBackendStsRole.java.md
index cf6195b1..555dc145 100644
--- a/docs/awsAuthBackendStsRole.java.md
+++ b/docs/awsAuthBackendStsRole.java.md
@@ -4,7 +4,7 @@
### AwsAuthBackendStsRole
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_sts_role vault_aws_auth_backend_sts_role}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_sts_role vault_aws_auth_backend_sts_role}.
#### Initializers
@@ -45,7 +45,7 @@ AwsAuthBackendStsRole.Builder.create(Construct scope, java.lang.String id)
| accountId
| java.lang.String
| AWS account ID to be associated with STS role. |
| stsRole
| java.lang.String
| AWS ARN for STS role to be assumed when interacting with the account specified. |
| backend
| java.lang.String
| Unique name of the auth backend to configure. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_sts_role#id AwsAuthBackendStsRole#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_sts_role#id AwsAuthBackendStsRole#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
---
@@ -116,7 +116,7 @@ Must be unique amongst siblings in the same scope
AWS account ID to be associated with STS role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_sts_role#account_id AwsAuthBackendStsRole#account_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_sts_role#account_id AwsAuthBackendStsRole#account_id}
---
@@ -126,7 +126,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
AWS ARN for STS role to be assumed when interacting with the account specified.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_sts_role#sts_role AwsAuthBackendStsRole#sts_role}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_sts_role#sts_role AwsAuthBackendStsRole#sts_role}
---
@@ -136,7 +136,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Unique name of the auth backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_sts_role#backend AwsAuthBackendStsRole#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_sts_role#backend AwsAuthBackendStsRole#backend}
---
@@ -144,7 +144,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_sts_role#id AwsAuthBackendStsRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_sts_role#id AwsAuthBackendStsRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -157,7 +157,7 @@ If you experience problems setting this value it might not be settable. Please t
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_sts_role#namespace AwsAuthBackendStsRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_sts_role#namespace AwsAuthBackendStsRole#namespace}
---
@@ -605,7 +605,7 @@ The construct id used in the generated config for the AwsAuthBackendStsRole to i
The id of the existing AwsAuthBackendStsRole that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_sts_role#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_sts_role#import import section} in the documentation of this resource for the id to use
---
@@ -951,7 +951,7 @@ AwsAuthBackendStsRoleConfig.builder()
| accountId
| java.lang.String
| AWS account ID to be associated with STS role. |
| stsRole
| java.lang.String
| AWS ARN for STS role to be assumed when interacting with the account specified. |
| backend
| java.lang.String
| Unique name of the auth backend to configure. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_sts_role#id AwsAuthBackendStsRole#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_sts_role#id AwsAuthBackendStsRole#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
---
@@ -1036,7 +1036,7 @@ public java.lang.String getAccountId();
AWS account ID to be associated with STS role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_sts_role#account_id AwsAuthBackendStsRole#account_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_sts_role#account_id AwsAuthBackendStsRole#account_id}
---
@@ -1050,7 +1050,7 @@ public java.lang.String getStsRole();
AWS ARN for STS role to be assumed when interacting with the account specified.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_sts_role#sts_role AwsAuthBackendStsRole#sts_role}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_sts_role#sts_role AwsAuthBackendStsRole#sts_role}
---
@@ -1064,7 +1064,7 @@ public java.lang.String getBackend();
Unique name of the auth backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_sts_role#backend AwsAuthBackendStsRole#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_sts_role#backend AwsAuthBackendStsRole#backend}
---
@@ -1076,7 +1076,7 @@ public java.lang.String getId();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_sts_role#id AwsAuthBackendStsRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_sts_role#id AwsAuthBackendStsRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1093,7 +1093,7 @@ public java.lang.String getNamespace();
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_sts_role#namespace AwsAuthBackendStsRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_sts_role#namespace AwsAuthBackendStsRole#namespace}
---
diff --git a/docs/awsAuthBackendStsRole.python.md b/docs/awsAuthBackendStsRole.python.md
index 1d940a61..bdbad4c8 100644
--- a/docs/awsAuthBackendStsRole.python.md
+++ b/docs/awsAuthBackendStsRole.python.md
@@ -4,7 +4,7 @@
### AwsAuthBackendStsRole
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_sts_role vault_aws_auth_backend_sts_role}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_sts_role vault_aws_auth_backend_sts_role}.
#### Initializers
@@ -43,7 +43,7 @@ awsAuthBackendStsRole.AwsAuthBackendStsRole(
| account_id
| str
| AWS account ID to be associated with STS role. |
| sts_role
| str
| AWS ARN for STS role to be assumed when interacting with the account specified. |
| backend
| str
| Unique name of the auth backend to configure. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_sts_role#id AwsAuthBackendStsRole#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_sts_role#id AwsAuthBackendStsRole#id}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
---
@@ -114,7 +114,7 @@ Must be unique amongst siblings in the same scope
AWS account ID to be associated with STS role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_sts_role#account_id AwsAuthBackendStsRole#account_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_sts_role#account_id AwsAuthBackendStsRole#account_id}
---
@@ -124,7 +124,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
AWS ARN for STS role to be assumed when interacting with the account specified.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_sts_role#sts_role AwsAuthBackendStsRole#sts_role}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_sts_role#sts_role AwsAuthBackendStsRole#sts_role}
---
@@ -134,7 +134,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Unique name of the auth backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_sts_role#backend AwsAuthBackendStsRole#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_sts_role#backend AwsAuthBackendStsRole#backend}
---
@@ -142,7 +142,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_sts_role#id AwsAuthBackendStsRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_sts_role#id AwsAuthBackendStsRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -155,7 +155,7 @@ If you experience problems setting this value it might not be settable. Please t
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_sts_role#namespace AwsAuthBackendStsRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_sts_role#namespace AwsAuthBackendStsRole#namespace}
---
@@ -649,7 +649,7 @@ The construct id used in the generated config for the AwsAuthBackendStsRole to i
The id of the existing AwsAuthBackendStsRole that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_sts_role#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_sts_role#import import section} in the documentation of this resource for the id to use
---
@@ -991,7 +991,7 @@ awsAuthBackendStsRole.AwsAuthBackendStsRoleConfig(
| account_id
| str
| AWS account ID to be associated with STS role. |
| sts_role
| str
| AWS ARN for STS role to be assumed when interacting with the account specified. |
| backend
| str
| Unique name of the auth backend to configure. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_sts_role#id AwsAuthBackendStsRole#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_sts_role#id AwsAuthBackendStsRole#id}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
---
@@ -1076,7 +1076,7 @@ account_id: str
AWS account ID to be associated with STS role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_sts_role#account_id AwsAuthBackendStsRole#account_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_sts_role#account_id AwsAuthBackendStsRole#account_id}
---
@@ -1090,7 +1090,7 @@ sts_role: str
AWS ARN for STS role to be assumed when interacting with the account specified.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_sts_role#sts_role AwsAuthBackendStsRole#sts_role}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_sts_role#sts_role AwsAuthBackendStsRole#sts_role}
---
@@ -1104,7 +1104,7 @@ backend: str
Unique name of the auth backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_sts_role#backend AwsAuthBackendStsRole#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_sts_role#backend AwsAuthBackendStsRole#backend}
---
@@ -1116,7 +1116,7 @@ id: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_sts_role#id AwsAuthBackendStsRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_sts_role#id AwsAuthBackendStsRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1133,7 +1133,7 @@ namespace: str
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_sts_role#namespace AwsAuthBackendStsRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_sts_role#namespace AwsAuthBackendStsRole#namespace}
---
diff --git a/docs/awsAuthBackendStsRole.typescript.md b/docs/awsAuthBackendStsRole.typescript.md
index d86dc053..4b0f422e 100644
--- a/docs/awsAuthBackendStsRole.typescript.md
+++ b/docs/awsAuthBackendStsRole.typescript.md
@@ -4,7 +4,7 @@
### AwsAuthBackendStsRole
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_sts_role vault_aws_auth_backend_sts_role}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_sts_role vault_aws_auth_backend_sts_role}.
#### Initializers
@@ -488,7 +488,7 @@ The construct id used in the generated config for the AwsAuthBackendStsRole to i
The id of the existing AwsAuthBackendStsRole that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_sts_role#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_sts_role#import import section} in the documentation of this resource for the id to use
---
@@ -817,7 +817,7 @@ const awsAuthBackendStsRoleConfig: awsAuthBackendStsRole.AwsAuthBackendStsRoleCo
| accountId
| string
| AWS account ID to be associated with STS role. |
| stsRole
| string
| AWS ARN for STS role to be assumed when interacting with the account specified. |
| backend
| string
| Unique name of the auth backend to configure. |
-| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_sts_role#id AwsAuthBackendStsRole#id}. |
+| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_sts_role#id AwsAuthBackendStsRole#id}. |
| namespace
| string
| Target namespace. (requires Enterprise). |
---
@@ -902,7 +902,7 @@ public readonly accountId: string;
AWS account ID to be associated with STS role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_sts_role#account_id AwsAuthBackendStsRole#account_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_sts_role#account_id AwsAuthBackendStsRole#account_id}
---
@@ -916,7 +916,7 @@ public readonly stsRole: string;
AWS ARN for STS role to be assumed when interacting with the account specified.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_sts_role#sts_role AwsAuthBackendStsRole#sts_role}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_sts_role#sts_role AwsAuthBackendStsRole#sts_role}
---
@@ -930,7 +930,7 @@ public readonly backend: string;
Unique name of the auth backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_sts_role#backend AwsAuthBackendStsRole#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_sts_role#backend AwsAuthBackendStsRole#backend}
---
@@ -942,7 +942,7 @@ public readonly id: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_sts_role#id AwsAuthBackendStsRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_sts_role#id AwsAuthBackendStsRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -959,7 +959,7 @@ public readonly namespace: string;
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_sts_role#namespace AwsAuthBackendStsRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_sts_role#namespace AwsAuthBackendStsRole#namespace}
---
diff --git a/docs/awsSecretBackend.csharp.md b/docs/awsSecretBackend.csharp.md
index 2053bc91..223b9f18 100644
--- a/docs/awsSecretBackend.csharp.md
+++ b/docs/awsSecretBackend.csharp.md
@@ -4,7 +4,7 @@
### AwsSecretBackend
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend vault_aws_secret_backend}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend vault_aws_secret_backend}.
#### Initializers
@@ -593,7 +593,7 @@ The construct id used in the generated config for the AwsSecretBackend to import
The id of the existing AwsSecretBackend that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#import import section} in the documentation of this resource for the id to use
---
@@ -1236,7 +1236,7 @@ new AwsSecretBackendConfig {
| Description
| string
| Human-friendly description of the mount for the backend. |
| DisableRemount
| object
| If set, opts out of mount migration on path updates. |
| IamEndpoint
| string
| Specifies a custom HTTP IAM endpoint to use. |
-| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#id AwsSecretBackend#id}. |
+| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#id AwsSecretBackend#id}. |
| IdentityTokenAudience
| string
| The audience claim value. |
| IdentityTokenKey
| string
| The key to use for signing identity tokens. |
| IdentityTokenTtl
| double
| The TTL of generated identity tokens in seconds. |
@@ -1332,7 +1332,7 @@ public string AccessKey { get; set; }
The AWS Access Key ID to use when generating new credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#access_key AwsSecretBackend#access_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#access_key AwsSecretBackend#access_key}
---
@@ -1346,7 +1346,7 @@ public double DefaultLeaseTtlSeconds { get; set; }
Default lease duration for secrets in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#default_lease_ttl_seconds AwsSecretBackend#default_lease_ttl_seconds}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#default_lease_ttl_seconds AwsSecretBackend#default_lease_ttl_seconds}
---
@@ -1360,7 +1360,7 @@ public string Description { get; set; }
Human-friendly description of the mount for the backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#description AwsSecretBackend#description}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#description AwsSecretBackend#description}
---
@@ -1374,7 +1374,7 @@ public object DisableRemount { get; set; }
If set, opts out of mount migration on path updates.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#disable_remount AwsSecretBackend#disable_remount}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#disable_remount AwsSecretBackend#disable_remount}
---
@@ -1388,7 +1388,7 @@ public string IamEndpoint { get; set; }
Specifies a custom HTTP IAM endpoint to use.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#iam_endpoint AwsSecretBackend#iam_endpoint}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#iam_endpoint AwsSecretBackend#iam_endpoint}
---
@@ -1400,7 +1400,7 @@ public string Id { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#id AwsSecretBackend#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#id AwsSecretBackend#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1417,7 +1417,7 @@ public string IdentityTokenAudience { get; set; }
The audience claim value.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#identity_token_audience AwsSecretBackend#identity_token_audience}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#identity_token_audience AwsSecretBackend#identity_token_audience}
---
@@ -1431,7 +1431,7 @@ public string IdentityTokenKey { get; set; }
The key to use for signing identity tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#identity_token_key AwsSecretBackend#identity_token_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#identity_token_key AwsSecretBackend#identity_token_key}
---
@@ -1445,7 +1445,7 @@ public double IdentityTokenTtl { get; set; }
The TTL of generated identity tokens in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#identity_token_ttl AwsSecretBackend#identity_token_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#identity_token_ttl AwsSecretBackend#identity_token_ttl}
---
@@ -1459,7 +1459,7 @@ public object Local { get; set; }
Specifies if the secret backend is local only.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#local AwsSecretBackend#local}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#local AwsSecretBackend#local}
---
@@ -1473,7 +1473,7 @@ public double MaxLeaseTtlSeconds { get; set; }
Maximum possible lease duration for secrets in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#max_lease_ttl_seconds AwsSecretBackend#max_lease_ttl_seconds}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#max_lease_ttl_seconds AwsSecretBackend#max_lease_ttl_seconds}
---
@@ -1487,7 +1487,7 @@ public string Namespace { get; set; }
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#namespace AwsSecretBackend#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#namespace AwsSecretBackend#namespace}
---
@@ -1501,7 +1501,7 @@ public string Path { get; set; }
Path to mount the backend at.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#path AwsSecretBackend#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#path AwsSecretBackend#path}
---
@@ -1515,7 +1515,7 @@ public string Region { get; set; }
The AWS region to make API calls against. Defaults to us-east-1.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#region AwsSecretBackend#region}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#region AwsSecretBackend#region}
---
@@ -1529,7 +1529,7 @@ public string RoleArn { get; set; }
Role ARN to assume for plugin identity token federation.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#role_arn AwsSecretBackend#role_arn}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#role_arn AwsSecretBackend#role_arn}
---
@@ -1543,7 +1543,7 @@ public string SecretKey { get; set; }
The AWS Secret Access Key to use when generating new credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#secret_key AwsSecretBackend#secret_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#secret_key AwsSecretBackend#secret_key}
---
@@ -1557,7 +1557,7 @@ public string StsEndpoint { get; set; }
Specifies a custom HTTP STS endpoint to use.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#sts_endpoint AwsSecretBackend#sts_endpoint}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#sts_endpoint AwsSecretBackend#sts_endpoint}
---
@@ -1571,7 +1571,7 @@ public string UsernameTemplate { get; set; }
Template describing how dynamic usernames are generated.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#username_template AwsSecretBackend#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#username_template AwsSecretBackend#username_template}
---
diff --git a/docs/awsSecretBackend.go.md b/docs/awsSecretBackend.go.md
index 2218c77c..db2fc9dc 100644
--- a/docs/awsSecretBackend.go.md
+++ b/docs/awsSecretBackend.go.md
@@ -4,7 +4,7 @@
### AwsSecretBackend
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend vault_aws_secret_backend}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend vault_aws_secret_backend}.
#### Initializers
@@ -593,7 +593,7 @@ The construct id used in the generated config for the AwsSecretBackend to import
The id of the existing AwsSecretBackend that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#import import section} in the documentation of this resource for the id to use
---
@@ -1236,7 +1236,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/awssecretbackend"
| Description
| *string
| Human-friendly description of the mount for the backend. |
| DisableRemount
| interface{}
| If set, opts out of mount migration on path updates. |
| IamEndpoint
| *string
| Specifies a custom HTTP IAM endpoint to use. |
-| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#id AwsSecretBackend#id}. |
+| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#id AwsSecretBackend#id}. |
| IdentityTokenAudience
| *string
| The audience claim value. |
| IdentityTokenKey
| *string
| The key to use for signing identity tokens. |
| IdentityTokenTtl
| *f64
| The TTL of generated identity tokens in seconds. |
@@ -1332,7 +1332,7 @@ AccessKey *string
The AWS Access Key ID to use when generating new credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#access_key AwsSecretBackend#access_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#access_key AwsSecretBackend#access_key}
---
@@ -1346,7 +1346,7 @@ DefaultLeaseTtlSeconds *f64
Default lease duration for secrets in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#default_lease_ttl_seconds AwsSecretBackend#default_lease_ttl_seconds}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#default_lease_ttl_seconds AwsSecretBackend#default_lease_ttl_seconds}
---
@@ -1360,7 +1360,7 @@ Description *string
Human-friendly description of the mount for the backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#description AwsSecretBackend#description}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#description AwsSecretBackend#description}
---
@@ -1374,7 +1374,7 @@ DisableRemount interface{}
If set, opts out of mount migration on path updates.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#disable_remount AwsSecretBackend#disable_remount}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#disable_remount AwsSecretBackend#disable_remount}
---
@@ -1388,7 +1388,7 @@ IamEndpoint *string
Specifies a custom HTTP IAM endpoint to use.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#iam_endpoint AwsSecretBackend#iam_endpoint}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#iam_endpoint AwsSecretBackend#iam_endpoint}
---
@@ -1400,7 +1400,7 @@ Id *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#id AwsSecretBackend#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#id AwsSecretBackend#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1417,7 +1417,7 @@ IdentityTokenAudience *string
The audience claim value.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#identity_token_audience AwsSecretBackend#identity_token_audience}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#identity_token_audience AwsSecretBackend#identity_token_audience}
---
@@ -1431,7 +1431,7 @@ IdentityTokenKey *string
The key to use for signing identity tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#identity_token_key AwsSecretBackend#identity_token_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#identity_token_key AwsSecretBackend#identity_token_key}
---
@@ -1445,7 +1445,7 @@ IdentityTokenTtl *f64
The TTL of generated identity tokens in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#identity_token_ttl AwsSecretBackend#identity_token_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#identity_token_ttl AwsSecretBackend#identity_token_ttl}
---
@@ -1459,7 +1459,7 @@ Local interface{}
Specifies if the secret backend is local only.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#local AwsSecretBackend#local}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#local AwsSecretBackend#local}
---
@@ -1473,7 +1473,7 @@ MaxLeaseTtlSeconds *f64
Maximum possible lease duration for secrets in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#max_lease_ttl_seconds AwsSecretBackend#max_lease_ttl_seconds}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#max_lease_ttl_seconds AwsSecretBackend#max_lease_ttl_seconds}
---
@@ -1487,7 +1487,7 @@ Namespace *string
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#namespace AwsSecretBackend#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#namespace AwsSecretBackend#namespace}
---
@@ -1501,7 +1501,7 @@ Path *string
Path to mount the backend at.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#path AwsSecretBackend#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#path AwsSecretBackend#path}
---
@@ -1515,7 +1515,7 @@ Region *string
The AWS region to make API calls against. Defaults to us-east-1.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#region AwsSecretBackend#region}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#region AwsSecretBackend#region}
---
@@ -1529,7 +1529,7 @@ RoleArn *string
Role ARN to assume for plugin identity token federation.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#role_arn AwsSecretBackend#role_arn}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#role_arn AwsSecretBackend#role_arn}
---
@@ -1543,7 +1543,7 @@ SecretKey *string
The AWS Secret Access Key to use when generating new credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#secret_key AwsSecretBackend#secret_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#secret_key AwsSecretBackend#secret_key}
---
@@ -1557,7 +1557,7 @@ StsEndpoint *string
Specifies a custom HTTP STS endpoint to use.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#sts_endpoint AwsSecretBackend#sts_endpoint}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#sts_endpoint AwsSecretBackend#sts_endpoint}
---
@@ -1571,7 +1571,7 @@ UsernameTemplate *string
Template describing how dynamic usernames are generated.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#username_template AwsSecretBackend#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#username_template AwsSecretBackend#username_template}
---
diff --git a/docs/awsSecretBackend.java.md b/docs/awsSecretBackend.java.md
index 90d5e102..1c8960fb 100644
--- a/docs/awsSecretBackend.java.md
+++ b/docs/awsSecretBackend.java.md
@@ -4,7 +4,7 @@
### AwsSecretBackend
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend vault_aws_secret_backend}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend vault_aws_secret_backend}.
#### Initializers
@@ -62,7 +62,7 @@ AwsSecretBackend.Builder.create(Construct scope, java.lang.String id)
| description
| java.lang.String
| Human-friendly description of the mount for the backend. |
| disableRemount
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| If set, opts out of mount migration on path updates. |
| iamEndpoint
| java.lang.String
| Specifies a custom HTTP IAM endpoint to use. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#id AwsSecretBackend#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#id AwsSecretBackend#id}. |
| identityTokenAudience
| java.lang.String
| The audience claim value. |
| identityTokenKey
| java.lang.String
| The key to use for signing identity tokens. |
| identityTokenTtl
| java.lang.Number
| The TTL of generated identity tokens in seconds. |
@@ -144,7 +144,7 @@ Must be unique amongst siblings in the same scope
The AWS Access Key ID to use when generating new credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#access_key AwsSecretBackend#access_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#access_key AwsSecretBackend#access_key}
---
@@ -154,7 +154,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Default lease duration for secrets in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#default_lease_ttl_seconds AwsSecretBackend#default_lease_ttl_seconds}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#default_lease_ttl_seconds AwsSecretBackend#default_lease_ttl_seconds}
---
@@ -164,7 +164,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Human-friendly description of the mount for the backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#description AwsSecretBackend#description}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#description AwsSecretBackend#description}
---
@@ -174,7 +174,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
If set, opts out of mount migration on path updates.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#disable_remount AwsSecretBackend#disable_remount}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#disable_remount AwsSecretBackend#disable_remount}
---
@@ -184,7 +184,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Specifies a custom HTTP IAM endpoint to use.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#iam_endpoint AwsSecretBackend#iam_endpoint}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#iam_endpoint AwsSecretBackend#iam_endpoint}
---
@@ -192,7 +192,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#id AwsSecretBackend#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#id AwsSecretBackend#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -205,7 +205,7 @@ If you experience problems setting this value it might not be settable. Please t
The audience claim value.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#identity_token_audience AwsSecretBackend#identity_token_audience}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#identity_token_audience AwsSecretBackend#identity_token_audience}
---
@@ -215,7 +215,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The key to use for signing identity tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#identity_token_key AwsSecretBackend#identity_token_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#identity_token_key AwsSecretBackend#identity_token_key}
---
@@ -225,7 +225,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The TTL of generated identity tokens in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#identity_token_ttl AwsSecretBackend#identity_token_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#identity_token_ttl AwsSecretBackend#identity_token_ttl}
---
@@ -235,7 +235,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Specifies if the secret backend is local only.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#local AwsSecretBackend#local}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#local AwsSecretBackend#local}
---
@@ -245,7 +245,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Maximum possible lease duration for secrets in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#max_lease_ttl_seconds AwsSecretBackend#max_lease_ttl_seconds}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#max_lease_ttl_seconds AwsSecretBackend#max_lease_ttl_seconds}
---
@@ -255,7 +255,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#namespace AwsSecretBackend#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#namespace AwsSecretBackend#namespace}
---
@@ -265,7 +265,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Path to mount the backend at.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#path AwsSecretBackend#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#path AwsSecretBackend#path}
---
@@ -275,7 +275,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The AWS region to make API calls against. Defaults to us-east-1.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#region AwsSecretBackend#region}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#region AwsSecretBackend#region}
---
@@ -285,7 +285,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Role ARN to assume for plugin identity token federation.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#role_arn AwsSecretBackend#role_arn}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#role_arn AwsSecretBackend#role_arn}
---
@@ -295,7 +295,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The AWS Secret Access Key to use when generating new credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#secret_key AwsSecretBackend#secret_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#secret_key AwsSecretBackend#secret_key}
---
@@ -305,7 +305,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Specifies a custom HTTP STS endpoint to use.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#sts_endpoint AwsSecretBackend#sts_endpoint}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#sts_endpoint AwsSecretBackend#sts_endpoint}
---
@@ -315,7 +315,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Template describing how dynamic usernames are generated.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#username_template AwsSecretBackend#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#username_template AwsSecretBackend#username_template}
---
@@ -868,7 +868,7 @@ The construct id used in the generated config for the AwsSecretBackend to import
The id of the existing AwsSecretBackend that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#import import section} in the documentation of this resource for the id to use
---
@@ -1517,7 +1517,7 @@ AwsSecretBackendConfig.builder()
| description
| java.lang.String
| Human-friendly description of the mount for the backend. |
| disableRemount
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| If set, opts out of mount migration on path updates. |
| iamEndpoint
| java.lang.String
| Specifies a custom HTTP IAM endpoint to use. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#id AwsSecretBackend#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#id AwsSecretBackend#id}. |
| identityTokenAudience
| java.lang.String
| The audience claim value. |
| identityTokenKey
| java.lang.String
| The key to use for signing identity tokens. |
| identityTokenTtl
| java.lang.Number
| The TTL of generated identity tokens in seconds. |
@@ -1613,7 +1613,7 @@ public java.lang.String getAccessKey();
The AWS Access Key ID to use when generating new credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#access_key AwsSecretBackend#access_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#access_key AwsSecretBackend#access_key}
---
@@ -1627,7 +1627,7 @@ public java.lang.Number getDefaultLeaseTtlSeconds();
Default lease duration for secrets in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#default_lease_ttl_seconds AwsSecretBackend#default_lease_ttl_seconds}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#default_lease_ttl_seconds AwsSecretBackend#default_lease_ttl_seconds}
---
@@ -1641,7 +1641,7 @@ public java.lang.String getDescription();
Human-friendly description of the mount for the backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#description AwsSecretBackend#description}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#description AwsSecretBackend#description}
---
@@ -1655,7 +1655,7 @@ public java.lang.Object getDisableRemount();
If set, opts out of mount migration on path updates.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#disable_remount AwsSecretBackend#disable_remount}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#disable_remount AwsSecretBackend#disable_remount}
---
@@ -1669,7 +1669,7 @@ public java.lang.String getIamEndpoint();
Specifies a custom HTTP IAM endpoint to use.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#iam_endpoint AwsSecretBackend#iam_endpoint}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#iam_endpoint AwsSecretBackend#iam_endpoint}
---
@@ -1681,7 +1681,7 @@ public java.lang.String getId();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#id AwsSecretBackend#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#id AwsSecretBackend#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1698,7 +1698,7 @@ public java.lang.String getIdentityTokenAudience();
The audience claim value.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#identity_token_audience AwsSecretBackend#identity_token_audience}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#identity_token_audience AwsSecretBackend#identity_token_audience}
---
@@ -1712,7 +1712,7 @@ public java.lang.String getIdentityTokenKey();
The key to use for signing identity tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#identity_token_key AwsSecretBackend#identity_token_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#identity_token_key AwsSecretBackend#identity_token_key}
---
@@ -1726,7 +1726,7 @@ public java.lang.Number getIdentityTokenTtl();
The TTL of generated identity tokens in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#identity_token_ttl AwsSecretBackend#identity_token_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#identity_token_ttl AwsSecretBackend#identity_token_ttl}
---
@@ -1740,7 +1740,7 @@ public java.lang.Object getLocal();
Specifies if the secret backend is local only.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#local AwsSecretBackend#local}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#local AwsSecretBackend#local}
---
@@ -1754,7 +1754,7 @@ public java.lang.Number getMaxLeaseTtlSeconds();
Maximum possible lease duration for secrets in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#max_lease_ttl_seconds AwsSecretBackend#max_lease_ttl_seconds}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#max_lease_ttl_seconds AwsSecretBackend#max_lease_ttl_seconds}
---
@@ -1768,7 +1768,7 @@ public java.lang.String getNamespace();
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#namespace AwsSecretBackend#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#namespace AwsSecretBackend#namespace}
---
@@ -1782,7 +1782,7 @@ public java.lang.String getPath();
Path to mount the backend at.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#path AwsSecretBackend#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#path AwsSecretBackend#path}
---
@@ -1796,7 +1796,7 @@ public java.lang.String getRegion();
The AWS region to make API calls against. Defaults to us-east-1.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#region AwsSecretBackend#region}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#region AwsSecretBackend#region}
---
@@ -1810,7 +1810,7 @@ public java.lang.String getRoleArn();
Role ARN to assume for plugin identity token federation.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#role_arn AwsSecretBackend#role_arn}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#role_arn AwsSecretBackend#role_arn}
---
@@ -1824,7 +1824,7 @@ public java.lang.String getSecretKey();
The AWS Secret Access Key to use when generating new credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#secret_key AwsSecretBackend#secret_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#secret_key AwsSecretBackend#secret_key}
---
@@ -1838,7 +1838,7 @@ public java.lang.String getStsEndpoint();
Specifies a custom HTTP STS endpoint to use.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#sts_endpoint AwsSecretBackend#sts_endpoint}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#sts_endpoint AwsSecretBackend#sts_endpoint}
---
@@ -1852,7 +1852,7 @@ public java.lang.String getUsernameTemplate();
Template describing how dynamic usernames are generated.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#username_template AwsSecretBackend#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#username_template AwsSecretBackend#username_template}
---
diff --git a/docs/awsSecretBackend.python.md b/docs/awsSecretBackend.python.md
index b83bab42..613602c8 100644
--- a/docs/awsSecretBackend.python.md
+++ b/docs/awsSecretBackend.python.md
@@ -4,7 +4,7 @@
### AwsSecretBackend
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend vault_aws_secret_backend}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend vault_aws_secret_backend}.
#### Initializers
@@ -58,7 +58,7 @@ awsSecretBackend.AwsSecretBackend(
| description
| str
| Human-friendly description of the mount for the backend. |
| disable_remount
| typing.Union[bool, cdktf.IResolvable]
| If set, opts out of mount migration on path updates. |
| iam_endpoint
| str
| Specifies a custom HTTP IAM endpoint to use. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#id AwsSecretBackend#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#id AwsSecretBackend#id}. |
| identity_token_audience
| str
| The audience claim value. |
| identity_token_key
| str
| The key to use for signing identity tokens. |
| identity_token_ttl
| typing.Union[int, float]
| The TTL of generated identity tokens in seconds. |
@@ -140,7 +140,7 @@ Must be unique amongst siblings in the same scope
The AWS Access Key ID to use when generating new credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#access_key AwsSecretBackend#access_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#access_key AwsSecretBackend#access_key}
---
@@ -150,7 +150,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Default lease duration for secrets in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#default_lease_ttl_seconds AwsSecretBackend#default_lease_ttl_seconds}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#default_lease_ttl_seconds AwsSecretBackend#default_lease_ttl_seconds}
---
@@ -160,7 +160,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Human-friendly description of the mount for the backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#description AwsSecretBackend#description}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#description AwsSecretBackend#description}
---
@@ -170,7 +170,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
If set, opts out of mount migration on path updates.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#disable_remount AwsSecretBackend#disable_remount}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#disable_remount AwsSecretBackend#disable_remount}
---
@@ -180,7 +180,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Specifies a custom HTTP IAM endpoint to use.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#iam_endpoint AwsSecretBackend#iam_endpoint}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#iam_endpoint AwsSecretBackend#iam_endpoint}
---
@@ -188,7 +188,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#id AwsSecretBackend#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#id AwsSecretBackend#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -201,7 +201,7 @@ If you experience problems setting this value it might not be settable. Please t
The audience claim value.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#identity_token_audience AwsSecretBackend#identity_token_audience}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#identity_token_audience AwsSecretBackend#identity_token_audience}
---
@@ -211,7 +211,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The key to use for signing identity tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#identity_token_key AwsSecretBackend#identity_token_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#identity_token_key AwsSecretBackend#identity_token_key}
---
@@ -221,7 +221,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The TTL of generated identity tokens in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#identity_token_ttl AwsSecretBackend#identity_token_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#identity_token_ttl AwsSecretBackend#identity_token_ttl}
---
@@ -231,7 +231,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Specifies if the secret backend is local only.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#local AwsSecretBackend#local}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#local AwsSecretBackend#local}
---
@@ -241,7 +241,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Maximum possible lease duration for secrets in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#max_lease_ttl_seconds AwsSecretBackend#max_lease_ttl_seconds}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#max_lease_ttl_seconds AwsSecretBackend#max_lease_ttl_seconds}
---
@@ -251,7 +251,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#namespace AwsSecretBackend#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#namespace AwsSecretBackend#namespace}
---
@@ -261,7 +261,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Path to mount the backend at.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#path AwsSecretBackend#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#path AwsSecretBackend#path}
---
@@ -271,7 +271,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The AWS region to make API calls against. Defaults to us-east-1.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#region AwsSecretBackend#region}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#region AwsSecretBackend#region}
---
@@ -281,7 +281,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Role ARN to assume for plugin identity token federation.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#role_arn AwsSecretBackend#role_arn}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#role_arn AwsSecretBackend#role_arn}
---
@@ -291,7 +291,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The AWS Secret Access Key to use when generating new credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#secret_key AwsSecretBackend#secret_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#secret_key AwsSecretBackend#secret_key}
---
@@ -301,7 +301,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Specifies a custom HTTP STS endpoint to use.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#sts_endpoint AwsSecretBackend#sts_endpoint}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#sts_endpoint AwsSecretBackend#sts_endpoint}
---
@@ -311,7 +311,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Template describing how dynamic usernames are generated.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#username_template AwsSecretBackend#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#username_template AwsSecretBackend#username_template}
---
@@ -910,7 +910,7 @@ The construct id used in the generated config for the AwsSecretBackend to import
The id of the existing AwsSecretBackend that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#import import section} in the documentation of this resource for the id to use
---
@@ -1553,7 +1553,7 @@ awsSecretBackend.AwsSecretBackendConfig(
| description
| str
| Human-friendly description of the mount for the backend. |
| disable_remount
| typing.Union[bool, cdktf.IResolvable]
| If set, opts out of mount migration on path updates. |
| iam_endpoint
| str
| Specifies a custom HTTP IAM endpoint to use. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#id AwsSecretBackend#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#id AwsSecretBackend#id}. |
| identity_token_audience
| str
| The audience claim value. |
| identity_token_key
| str
| The key to use for signing identity tokens. |
| identity_token_ttl
| typing.Union[int, float]
| The TTL of generated identity tokens in seconds. |
@@ -1649,7 +1649,7 @@ access_key: str
The AWS Access Key ID to use when generating new credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#access_key AwsSecretBackend#access_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#access_key AwsSecretBackend#access_key}
---
@@ -1663,7 +1663,7 @@ default_lease_ttl_seconds: typing.Union[int, float]
Default lease duration for secrets in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#default_lease_ttl_seconds AwsSecretBackend#default_lease_ttl_seconds}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#default_lease_ttl_seconds AwsSecretBackend#default_lease_ttl_seconds}
---
@@ -1677,7 +1677,7 @@ description: str
Human-friendly description of the mount for the backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#description AwsSecretBackend#description}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#description AwsSecretBackend#description}
---
@@ -1691,7 +1691,7 @@ disable_remount: typing.Union[bool, IResolvable]
If set, opts out of mount migration on path updates.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#disable_remount AwsSecretBackend#disable_remount}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#disable_remount AwsSecretBackend#disable_remount}
---
@@ -1705,7 +1705,7 @@ iam_endpoint: str
Specifies a custom HTTP IAM endpoint to use.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#iam_endpoint AwsSecretBackend#iam_endpoint}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#iam_endpoint AwsSecretBackend#iam_endpoint}
---
@@ -1717,7 +1717,7 @@ id: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#id AwsSecretBackend#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#id AwsSecretBackend#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1734,7 +1734,7 @@ identity_token_audience: str
The audience claim value.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#identity_token_audience AwsSecretBackend#identity_token_audience}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#identity_token_audience AwsSecretBackend#identity_token_audience}
---
@@ -1748,7 +1748,7 @@ identity_token_key: str
The key to use for signing identity tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#identity_token_key AwsSecretBackend#identity_token_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#identity_token_key AwsSecretBackend#identity_token_key}
---
@@ -1762,7 +1762,7 @@ identity_token_ttl: typing.Union[int, float]
The TTL of generated identity tokens in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#identity_token_ttl AwsSecretBackend#identity_token_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#identity_token_ttl AwsSecretBackend#identity_token_ttl}
---
@@ -1776,7 +1776,7 @@ local: typing.Union[bool, IResolvable]
Specifies if the secret backend is local only.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#local AwsSecretBackend#local}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#local AwsSecretBackend#local}
---
@@ -1790,7 +1790,7 @@ max_lease_ttl_seconds: typing.Union[int, float]
Maximum possible lease duration for secrets in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#max_lease_ttl_seconds AwsSecretBackend#max_lease_ttl_seconds}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#max_lease_ttl_seconds AwsSecretBackend#max_lease_ttl_seconds}
---
@@ -1804,7 +1804,7 @@ namespace: str
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#namespace AwsSecretBackend#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#namespace AwsSecretBackend#namespace}
---
@@ -1818,7 +1818,7 @@ path: str
Path to mount the backend at.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#path AwsSecretBackend#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#path AwsSecretBackend#path}
---
@@ -1832,7 +1832,7 @@ region: str
The AWS region to make API calls against. Defaults to us-east-1.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#region AwsSecretBackend#region}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#region AwsSecretBackend#region}
---
@@ -1846,7 +1846,7 @@ role_arn: str
Role ARN to assume for plugin identity token federation.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#role_arn AwsSecretBackend#role_arn}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#role_arn AwsSecretBackend#role_arn}
---
@@ -1860,7 +1860,7 @@ secret_key: str
The AWS Secret Access Key to use when generating new credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#secret_key AwsSecretBackend#secret_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#secret_key AwsSecretBackend#secret_key}
---
@@ -1874,7 +1874,7 @@ sts_endpoint: str
Specifies a custom HTTP STS endpoint to use.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#sts_endpoint AwsSecretBackend#sts_endpoint}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#sts_endpoint AwsSecretBackend#sts_endpoint}
---
@@ -1888,7 +1888,7 @@ username_template: str
Template describing how dynamic usernames are generated.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#username_template AwsSecretBackend#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#username_template AwsSecretBackend#username_template}
---
diff --git a/docs/awsSecretBackend.typescript.md b/docs/awsSecretBackend.typescript.md
index 1f3a1458..5650c2f0 100644
--- a/docs/awsSecretBackend.typescript.md
+++ b/docs/awsSecretBackend.typescript.md
@@ -4,7 +4,7 @@
### AwsSecretBackend
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend vault_aws_secret_backend}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend vault_aws_secret_backend}.
#### Initializers
@@ -593,7 +593,7 @@ The construct id used in the generated config for the AwsSecretBackend to import
The id of the existing AwsSecretBackend that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#import import section} in the documentation of this resource for the id to use
---
@@ -1210,7 +1210,7 @@ const awsSecretBackendConfig: awsSecretBackend.AwsSecretBackendConfig = { ... }
| description
| string
| Human-friendly description of the mount for the backend. |
| disableRemount
| boolean \| cdktf.IResolvable
| If set, opts out of mount migration on path updates. |
| iamEndpoint
| string
| Specifies a custom HTTP IAM endpoint to use. |
-| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#id AwsSecretBackend#id}. |
+| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#id AwsSecretBackend#id}. |
| identityTokenAudience
| string
| The audience claim value. |
| identityTokenKey
| string
| The key to use for signing identity tokens. |
| identityTokenTtl
| number
| The TTL of generated identity tokens in seconds. |
@@ -1306,7 +1306,7 @@ public readonly accessKey: string;
The AWS Access Key ID to use when generating new credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#access_key AwsSecretBackend#access_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#access_key AwsSecretBackend#access_key}
---
@@ -1320,7 +1320,7 @@ public readonly defaultLeaseTtlSeconds: number;
Default lease duration for secrets in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#default_lease_ttl_seconds AwsSecretBackend#default_lease_ttl_seconds}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#default_lease_ttl_seconds AwsSecretBackend#default_lease_ttl_seconds}
---
@@ -1334,7 +1334,7 @@ public readonly description: string;
Human-friendly description of the mount for the backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#description AwsSecretBackend#description}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#description AwsSecretBackend#description}
---
@@ -1348,7 +1348,7 @@ public readonly disableRemount: boolean | IResolvable;
If set, opts out of mount migration on path updates.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#disable_remount AwsSecretBackend#disable_remount}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#disable_remount AwsSecretBackend#disable_remount}
---
@@ -1362,7 +1362,7 @@ public readonly iamEndpoint: string;
Specifies a custom HTTP IAM endpoint to use.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#iam_endpoint AwsSecretBackend#iam_endpoint}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#iam_endpoint AwsSecretBackend#iam_endpoint}
---
@@ -1374,7 +1374,7 @@ public readonly id: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#id AwsSecretBackend#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#id AwsSecretBackend#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1391,7 +1391,7 @@ public readonly identityTokenAudience: string;
The audience claim value.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#identity_token_audience AwsSecretBackend#identity_token_audience}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#identity_token_audience AwsSecretBackend#identity_token_audience}
---
@@ -1405,7 +1405,7 @@ public readonly identityTokenKey: string;
The key to use for signing identity tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#identity_token_key AwsSecretBackend#identity_token_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#identity_token_key AwsSecretBackend#identity_token_key}
---
@@ -1419,7 +1419,7 @@ public readonly identityTokenTtl: number;
The TTL of generated identity tokens in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#identity_token_ttl AwsSecretBackend#identity_token_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#identity_token_ttl AwsSecretBackend#identity_token_ttl}
---
@@ -1433,7 +1433,7 @@ public readonly local: boolean | IResolvable;
Specifies if the secret backend is local only.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#local AwsSecretBackend#local}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#local AwsSecretBackend#local}
---
@@ -1447,7 +1447,7 @@ public readonly maxLeaseTtlSeconds: number;
Maximum possible lease duration for secrets in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#max_lease_ttl_seconds AwsSecretBackend#max_lease_ttl_seconds}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#max_lease_ttl_seconds AwsSecretBackend#max_lease_ttl_seconds}
---
@@ -1461,7 +1461,7 @@ public readonly namespace: string;
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#namespace AwsSecretBackend#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#namespace AwsSecretBackend#namespace}
---
@@ -1475,7 +1475,7 @@ public readonly path: string;
Path to mount the backend at.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#path AwsSecretBackend#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#path AwsSecretBackend#path}
---
@@ -1489,7 +1489,7 @@ public readonly region: string;
The AWS region to make API calls against. Defaults to us-east-1.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#region AwsSecretBackend#region}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#region AwsSecretBackend#region}
---
@@ -1503,7 +1503,7 @@ public readonly roleArn: string;
Role ARN to assume for plugin identity token federation.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#role_arn AwsSecretBackend#role_arn}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#role_arn AwsSecretBackend#role_arn}
---
@@ -1517,7 +1517,7 @@ public readonly secretKey: string;
The AWS Secret Access Key to use when generating new credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#secret_key AwsSecretBackend#secret_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#secret_key AwsSecretBackend#secret_key}
---
@@ -1531,7 +1531,7 @@ public readonly stsEndpoint: string;
Specifies a custom HTTP STS endpoint to use.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#sts_endpoint AwsSecretBackend#sts_endpoint}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#sts_endpoint AwsSecretBackend#sts_endpoint}
---
@@ -1545,7 +1545,7 @@ public readonly usernameTemplate: string;
Template describing how dynamic usernames are generated.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#username_template AwsSecretBackend#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#username_template AwsSecretBackend#username_template}
---
diff --git a/docs/awsSecretBackendRole.csharp.md b/docs/awsSecretBackendRole.csharp.md
index 6abe090c..5b2d16be 100644
--- a/docs/awsSecretBackendRole.csharp.md
+++ b/docs/awsSecretBackendRole.csharp.md
@@ -4,7 +4,7 @@
### AwsSecretBackendRole
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role vault_aws_secret_backend_role}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role vault_aws_secret_backend_role}.
#### Initializers
@@ -558,7 +558,7 @@ The construct id used in the generated config for the AwsSecretBackendRole to im
The id of the existing AwsSecretBackendRole that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#import import section} in the documentation of this resource for the id to use
---
@@ -1157,7 +1157,7 @@ new AwsSecretBackendRoleConfig {
| ExternalId
| string
| External ID to set for assume role creds. |
| IamGroups
| string[]
| A list of IAM group names. |
| IamTags
| System.Collections.Generic.IDictionary
| A map of strings representing key/value pairs used as tags for any IAM user created by this role. |
-| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#id AwsSecretBackendRole#id}. |
+| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#id AwsSecretBackendRole#id}. |
| MaxStsTtl
| double
| The max allowed TTL in seconds for STS credentials (credentials TTL are capped to max_sts_ttl). |
| Namespace
| string
| Target namespace. (requires Enterprise). |
| PermissionsBoundaryArn
| string
| The ARN of the AWS Permissions Boundary to attach to IAM users created in the role. |
@@ -1249,7 +1249,7 @@ public string Backend { get; set; }
The path of the AWS Secret Backend the role belongs to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#backend AwsSecretBackendRole#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#backend AwsSecretBackendRole#backend}
---
@@ -1263,7 +1263,7 @@ public string CredentialType { get; set; }
Role credential type.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#credential_type AwsSecretBackendRole#credential_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#credential_type AwsSecretBackendRole#credential_type}
---
@@ -1277,7 +1277,7 @@ public string Name { get; set; }
Unique name for the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#name AwsSecretBackendRole#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#name AwsSecretBackendRole#name}
---
@@ -1293,7 +1293,7 @@ The default TTL in seconds for STS credentials.
When a TTL is not specified when STS credentials are requested, and a default TTL is specified on the role, then this default TTL will be used. Valid only when credential_type is one of assumed_role or federation_token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#default_sts_ttl AwsSecretBackendRole#default_sts_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#default_sts_ttl AwsSecretBackendRole#default_sts_ttl}
---
@@ -1307,7 +1307,7 @@ public string ExternalId { get; set; }
External ID to set for assume role creds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#external_id AwsSecretBackendRole#external_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#external_id AwsSecretBackendRole#external_id}
---
@@ -1323,7 +1323,7 @@ A list of IAM group names.
IAM users generated against this vault role will be added to these IAM Groups. For a credential type of assumed_role or federation_token, the policies sent to the corresponding AWS call (sts:AssumeRole or sts:GetFederation) will be the policies from each group in iam_groups combined with the policy_document and policy_arns parameters.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#iam_groups AwsSecretBackendRole#iam_groups}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#iam_groups AwsSecretBackendRole#iam_groups}
---
@@ -1337,7 +1337,7 @@ public System.Collections.Generic.IDictionary IamTags { get; set
A map of strings representing key/value pairs used as tags for any IAM user created by this role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#iam_tags AwsSecretBackendRole#iam_tags}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#iam_tags AwsSecretBackendRole#iam_tags}
---
@@ -1349,7 +1349,7 @@ public string Id { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#id AwsSecretBackendRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#id AwsSecretBackendRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1368,7 +1368,7 @@ The max allowed TTL in seconds for STS credentials (credentials TTL are capped t
Valid only when credential_type is one of assumed_role or federation_token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#max_sts_ttl AwsSecretBackendRole#max_sts_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#max_sts_ttl AwsSecretBackendRole#max_sts_ttl}
---
@@ -1382,7 +1382,7 @@ public string Namespace { get; set; }
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#namespace AwsSecretBackendRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#namespace AwsSecretBackendRole#namespace}
---
@@ -1398,7 +1398,7 @@ The ARN of the AWS Permissions Boundary to attach to IAM users created in the ro
Valid only when credential_type is iam_user. If not specified, then no permissions boundary policy will be attached.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#permissions_boundary_arn AwsSecretBackendRole#permissions_boundary_arn}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#permissions_boundary_arn AwsSecretBackendRole#permissions_boundary_arn}
---
@@ -1412,7 +1412,7 @@ public string[] PolicyArns { get; set; }
ARN for an existing IAM policy the role should use.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#policy_arns AwsSecretBackendRole#policy_arns}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#policy_arns AwsSecretBackendRole#policy_arns}
---
@@ -1426,7 +1426,7 @@ public string PolicyDocument { get; set; }
IAM policy the role should use in JSON format.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#policy_document AwsSecretBackendRole#policy_document}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#policy_document AwsSecretBackendRole#policy_document}
---
@@ -1440,7 +1440,7 @@ public string[] RoleArns { get; set; }
ARNs of AWS roles allowed to be assumed. Only valid when credential_type is 'assumed_role'.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#role_arns AwsSecretBackendRole#role_arns}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#role_arns AwsSecretBackendRole#role_arns}
---
@@ -1454,7 +1454,7 @@ public System.Collections.Generic.IDictionary SessionTags { get;
Session tags to be set for assume role creds created.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#session_tags AwsSecretBackendRole#session_tags}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#session_tags AwsSecretBackendRole#session_tags}
---
@@ -1468,7 +1468,7 @@ public string UserPath { get; set; }
The path for the user name. Valid only when credential_type is iam_user. Default is /.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#user_path AwsSecretBackendRole#user_path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#user_path AwsSecretBackendRole#user_path}
---
diff --git a/docs/awsSecretBackendRole.go.md b/docs/awsSecretBackendRole.go.md
index 77d8988f..67963fb1 100644
--- a/docs/awsSecretBackendRole.go.md
+++ b/docs/awsSecretBackendRole.go.md
@@ -4,7 +4,7 @@
### AwsSecretBackendRole
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role vault_aws_secret_backend_role}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role vault_aws_secret_backend_role}.
#### Initializers
@@ -558,7 +558,7 @@ The construct id used in the generated config for the AwsSecretBackendRole to im
The id of the existing AwsSecretBackendRole that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#import import section} in the documentation of this resource for the id to use
---
@@ -1157,7 +1157,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/awssecretbackendrole"
| ExternalId
| *string
| External ID to set for assume role creds. |
| IamGroups
| *[]*string
| A list of IAM group names. |
| IamTags
| *map[string]*string
| A map of strings representing key/value pairs used as tags for any IAM user created by this role. |
-| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#id AwsSecretBackendRole#id}. |
+| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#id AwsSecretBackendRole#id}. |
| MaxStsTtl
| *f64
| The max allowed TTL in seconds for STS credentials (credentials TTL are capped to max_sts_ttl). |
| Namespace
| *string
| Target namespace. (requires Enterprise). |
| PermissionsBoundaryArn
| *string
| The ARN of the AWS Permissions Boundary to attach to IAM users created in the role. |
@@ -1249,7 +1249,7 @@ Backend *string
The path of the AWS Secret Backend the role belongs to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#backend AwsSecretBackendRole#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#backend AwsSecretBackendRole#backend}
---
@@ -1263,7 +1263,7 @@ CredentialType *string
Role credential type.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#credential_type AwsSecretBackendRole#credential_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#credential_type AwsSecretBackendRole#credential_type}
---
@@ -1277,7 +1277,7 @@ Name *string
Unique name for the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#name AwsSecretBackendRole#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#name AwsSecretBackendRole#name}
---
@@ -1293,7 +1293,7 @@ The default TTL in seconds for STS credentials.
When a TTL is not specified when STS credentials are requested, and a default TTL is specified on the role, then this default TTL will be used. Valid only when credential_type is one of assumed_role or federation_token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#default_sts_ttl AwsSecretBackendRole#default_sts_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#default_sts_ttl AwsSecretBackendRole#default_sts_ttl}
---
@@ -1307,7 +1307,7 @@ ExternalId *string
External ID to set for assume role creds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#external_id AwsSecretBackendRole#external_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#external_id AwsSecretBackendRole#external_id}
---
@@ -1323,7 +1323,7 @@ A list of IAM group names.
IAM users generated against this vault role will be added to these IAM Groups. For a credential type of assumed_role or federation_token, the policies sent to the corresponding AWS call (sts:AssumeRole or sts:GetFederation) will be the policies from each group in iam_groups combined with the policy_document and policy_arns parameters.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#iam_groups AwsSecretBackendRole#iam_groups}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#iam_groups AwsSecretBackendRole#iam_groups}
---
@@ -1337,7 +1337,7 @@ IamTags *map[string]*string
A map of strings representing key/value pairs used as tags for any IAM user created by this role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#iam_tags AwsSecretBackendRole#iam_tags}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#iam_tags AwsSecretBackendRole#iam_tags}
---
@@ -1349,7 +1349,7 @@ Id *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#id AwsSecretBackendRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#id AwsSecretBackendRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1368,7 +1368,7 @@ The max allowed TTL in seconds for STS credentials (credentials TTL are capped t
Valid only when credential_type is one of assumed_role or federation_token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#max_sts_ttl AwsSecretBackendRole#max_sts_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#max_sts_ttl AwsSecretBackendRole#max_sts_ttl}
---
@@ -1382,7 +1382,7 @@ Namespace *string
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#namespace AwsSecretBackendRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#namespace AwsSecretBackendRole#namespace}
---
@@ -1398,7 +1398,7 @@ The ARN of the AWS Permissions Boundary to attach to IAM users created in the ro
Valid only when credential_type is iam_user. If not specified, then no permissions boundary policy will be attached.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#permissions_boundary_arn AwsSecretBackendRole#permissions_boundary_arn}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#permissions_boundary_arn AwsSecretBackendRole#permissions_boundary_arn}
---
@@ -1412,7 +1412,7 @@ PolicyArns *[]*string
ARN for an existing IAM policy the role should use.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#policy_arns AwsSecretBackendRole#policy_arns}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#policy_arns AwsSecretBackendRole#policy_arns}
---
@@ -1426,7 +1426,7 @@ PolicyDocument *string
IAM policy the role should use in JSON format.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#policy_document AwsSecretBackendRole#policy_document}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#policy_document AwsSecretBackendRole#policy_document}
---
@@ -1440,7 +1440,7 @@ RoleArns *[]*string
ARNs of AWS roles allowed to be assumed. Only valid when credential_type is 'assumed_role'.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#role_arns AwsSecretBackendRole#role_arns}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#role_arns AwsSecretBackendRole#role_arns}
---
@@ -1454,7 +1454,7 @@ SessionTags *map[string]*string
Session tags to be set for assume role creds created.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#session_tags AwsSecretBackendRole#session_tags}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#session_tags AwsSecretBackendRole#session_tags}
---
@@ -1468,7 +1468,7 @@ UserPath *string
The path for the user name. Valid only when credential_type is iam_user. Default is /.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#user_path AwsSecretBackendRole#user_path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#user_path AwsSecretBackendRole#user_path}
---
diff --git a/docs/awsSecretBackendRole.java.md b/docs/awsSecretBackendRole.java.md
index 92e29fb3..bf40e2d8 100644
--- a/docs/awsSecretBackendRole.java.md
+++ b/docs/awsSecretBackendRole.java.md
@@ -4,7 +4,7 @@
### AwsSecretBackendRole
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role vault_aws_secret_backend_role}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role vault_aws_secret_backend_role}.
#### Initializers
@@ -60,7 +60,7 @@ AwsSecretBackendRole.Builder.create(Construct scope, java.lang.String id)
| externalId
| java.lang.String
| External ID to set for assume role creds. |
| iamGroups
| java.util.List
| A list of IAM group names. |
| iamTags
| java.util.Map
| A map of strings representing key/value pairs used as tags for any IAM user created by this role. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#id AwsSecretBackendRole#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#id AwsSecretBackendRole#id}. |
| maxStsTtl
| java.lang.Number
| The max allowed TTL in seconds for STS credentials (credentials TTL are capped to max_sts_ttl). |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
| permissionsBoundaryArn
| java.lang.String
| The ARN of the AWS Permissions Boundary to attach to IAM users created in the role. |
@@ -138,7 +138,7 @@ Must be unique amongst siblings in the same scope
The path of the AWS Secret Backend the role belongs to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#backend AwsSecretBackendRole#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#backend AwsSecretBackendRole#backend}
---
@@ -148,7 +148,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Role credential type.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#credential_type AwsSecretBackendRole#credential_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#credential_type AwsSecretBackendRole#credential_type}
---
@@ -158,7 +158,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Unique name for the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#name AwsSecretBackendRole#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#name AwsSecretBackendRole#name}
---
@@ -170,7 +170,7 @@ The default TTL in seconds for STS credentials.
When a TTL is not specified when STS credentials are requested, and a default TTL is specified on the role, then this default TTL will be used. Valid only when credential_type is one of assumed_role or federation_token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#default_sts_ttl AwsSecretBackendRole#default_sts_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#default_sts_ttl AwsSecretBackendRole#default_sts_ttl}
---
@@ -180,7 +180,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
External ID to set for assume role creds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#external_id AwsSecretBackendRole#external_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#external_id AwsSecretBackendRole#external_id}
---
@@ -192,7 +192,7 @@ A list of IAM group names.
IAM users generated against this vault role will be added to these IAM Groups. For a credential type of assumed_role or federation_token, the policies sent to the corresponding AWS call (sts:AssumeRole or sts:GetFederation) will be the policies from each group in iam_groups combined with the policy_document and policy_arns parameters.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#iam_groups AwsSecretBackendRole#iam_groups}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#iam_groups AwsSecretBackendRole#iam_groups}
---
@@ -202,7 +202,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
A map of strings representing key/value pairs used as tags for any IAM user created by this role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#iam_tags AwsSecretBackendRole#iam_tags}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#iam_tags AwsSecretBackendRole#iam_tags}
---
@@ -210,7 +210,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#id AwsSecretBackendRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#id AwsSecretBackendRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -225,7 +225,7 @@ The max allowed TTL in seconds for STS credentials (credentials TTL are capped t
Valid only when credential_type is one of assumed_role or federation_token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#max_sts_ttl AwsSecretBackendRole#max_sts_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#max_sts_ttl AwsSecretBackendRole#max_sts_ttl}
---
@@ -235,7 +235,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#namespace AwsSecretBackendRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#namespace AwsSecretBackendRole#namespace}
---
@@ -247,7 +247,7 @@ The ARN of the AWS Permissions Boundary to attach to IAM users created in the ro
Valid only when credential_type is iam_user. If not specified, then no permissions boundary policy will be attached.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#permissions_boundary_arn AwsSecretBackendRole#permissions_boundary_arn}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#permissions_boundary_arn AwsSecretBackendRole#permissions_boundary_arn}
---
@@ -257,7 +257,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
ARN for an existing IAM policy the role should use.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#policy_arns AwsSecretBackendRole#policy_arns}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#policy_arns AwsSecretBackendRole#policy_arns}
---
@@ -267,7 +267,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
IAM policy the role should use in JSON format.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#policy_document AwsSecretBackendRole#policy_document}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#policy_document AwsSecretBackendRole#policy_document}
---
@@ -277,7 +277,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
ARNs of AWS roles allowed to be assumed. Only valid when credential_type is 'assumed_role'.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#role_arns AwsSecretBackendRole#role_arns}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#role_arns AwsSecretBackendRole#role_arns}
---
@@ -287,7 +287,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Session tags to be set for assume role creds created.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#session_tags AwsSecretBackendRole#session_tags}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#session_tags AwsSecretBackendRole#session_tags}
---
@@ -297,7 +297,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The path for the user name. Valid only when credential_type is iam_user. Default is /.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#user_path AwsSecretBackendRole#user_path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#user_path AwsSecretBackendRole#user_path}
---
@@ -815,7 +815,7 @@ The construct id used in the generated config for the AwsSecretBackendRole to im
The id of the existing AwsSecretBackendRole that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#import import section} in the documentation of this resource for the id to use
---
@@ -1418,7 +1418,7 @@ AwsSecretBackendRoleConfig.builder()
| externalId
| java.lang.String
| External ID to set for assume role creds. |
| iamGroups
| java.util.List
| A list of IAM group names. |
| iamTags
| java.util.Map
| A map of strings representing key/value pairs used as tags for any IAM user created by this role. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#id AwsSecretBackendRole#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#id AwsSecretBackendRole#id}. |
| maxStsTtl
| java.lang.Number
| The max allowed TTL in seconds for STS credentials (credentials TTL are capped to max_sts_ttl). |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
| permissionsBoundaryArn
| java.lang.String
| The ARN of the AWS Permissions Boundary to attach to IAM users created in the role. |
@@ -1510,7 +1510,7 @@ public java.lang.String getBackend();
The path of the AWS Secret Backend the role belongs to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#backend AwsSecretBackendRole#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#backend AwsSecretBackendRole#backend}
---
@@ -1524,7 +1524,7 @@ public java.lang.String getCredentialType();
Role credential type.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#credential_type AwsSecretBackendRole#credential_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#credential_type AwsSecretBackendRole#credential_type}
---
@@ -1538,7 +1538,7 @@ public java.lang.String getName();
Unique name for the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#name AwsSecretBackendRole#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#name AwsSecretBackendRole#name}
---
@@ -1554,7 +1554,7 @@ The default TTL in seconds for STS credentials.
When a TTL is not specified when STS credentials are requested, and a default TTL is specified on the role, then this default TTL will be used. Valid only when credential_type is one of assumed_role or federation_token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#default_sts_ttl AwsSecretBackendRole#default_sts_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#default_sts_ttl AwsSecretBackendRole#default_sts_ttl}
---
@@ -1568,7 +1568,7 @@ public java.lang.String getExternalId();
External ID to set for assume role creds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#external_id AwsSecretBackendRole#external_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#external_id AwsSecretBackendRole#external_id}
---
@@ -1584,7 +1584,7 @@ A list of IAM group names.
IAM users generated against this vault role will be added to these IAM Groups. For a credential type of assumed_role or federation_token, the policies sent to the corresponding AWS call (sts:AssumeRole or sts:GetFederation) will be the policies from each group in iam_groups combined with the policy_document and policy_arns parameters.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#iam_groups AwsSecretBackendRole#iam_groups}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#iam_groups AwsSecretBackendRole#iam_groups}
---
@@ -1598,7 +1598,7 @@ public java.util.Map getIamTags();
A map of strings representing key/value pairs used as tags for any IAM user created by this role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#iam_tags AwsSecretBackendRole#iam_tags}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#iam_tags AwsSecretBackendRole#iam_tags}
---
@@ -1610,7 +1610,7 @@ public java.lang.String getId();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#id AwsSecretBackendRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#id AwsSecretBackendRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1629,7 +1629,7 @@ The max allowed TTL in seconds for STS credentials (credentials TTL are capped t
Valid only when credential_type is one of assumed_role or federation_token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#max_sts_ttl AwsSecretBackendRole#max_sts_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#max_sts_ttl AwsSecretBackendRole#max_sts_ttl}
---
@@ -1643,7 +1643,7 @@ public java.lang.String getNamespace();
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#namespace AwsSecretBackendRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#namespace AwsSecretBackendRole#namespace}
---
@@ -1659,7 +1659,7 @@ The ARN of the AWS Permissions Boundary to attach to IAM users created in the ro
Valid only when credential_type is iam_user. If not specified, then no permissions boundary policy will be attached.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#permissions_boundary_arn AwsSecretBackendRole#permissions_boundary_arn}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#permissions_boundary_arn AwsSecretBackendRole#permissions_boundary_arn}
---
@@ -1673,7 +1673,7 @@ public java.util.List getPolicyArns();
ARN for an existing IAM policy the role should use.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#policy_arns AwsSecretBackendRole#policy_arns}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#policy_arns AwsSecretBackendRole#policy_arns}
---
@@ -1687,7 +1687,7 @@ public java.lang.String getPolicyDocument();
IAM policy the role should use in JSON format.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#policy_document AwsSecretBackendRole#policy_document}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#policy_document AwsSecretBackendRole#policy_document}
---
@@ -1701,7 +1701,7 @@ public java.util.List getRoleArns();
ARNs of AWS roles allowed to be assumed. Only valid when credential_type is 'assumed_role'.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#role_arns AwsSecretBackendRole#role_arns}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#role_arns AwsSecretBackendRole#role_arns}
---
@@ -1715,7 +1715,7 @@ public java.util.Map getSessionTags();
Session tags to be set for assume role creds created.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#session_tags AwsSecretBackendRole#session_tags}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#session_tags AwsSecretBackendRole#session_tags}
---
@@ -1729,7 +1729,7 @@ public java.lang.String getUserPath();
The path for the user name. Valid only when credential_type is iam_user. Default is /.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#user_path AwsSecretBackendRole#user_path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#user_path AwsSecretBackendRole#user_path}
---
diff --git a/docs/awsSecretBackendRole.python.md b/docs/awsSecretBackendRole.python.md
index 282417c7..e4416976 100644
--- a/docs/awsSecretBackendRole.python.md
+++ b/docs/awsSecretBackendRole.python.md
@@ -4,7 +4,7 @@
### AwsSecretBackendRole
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role vault_aws_secret_backend_role}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role vault_aws_secret_backend_role}.
#### Initializers
@@ -58,7 +58,7 @@ awsSecretBackendRole.AwsSecretBackendRole(
| external_id
| str
| External ID to set for assume role creds. |
| iam_groups
| typing.List[str]
| A list of IAM group names. |
| iam_tags
| typing.Mapping[str]
| A map of strings representing key/value pairs used as tags for any IAM user created by this role. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#id AwsSecretBackendRole#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#id AwsSecretBackendRole#id}. |
| max_sts_ttl
| typing.Union[int, float]
| The max allowed TTL in seconds for STS credentials (credentials TTL are capped to max_sts_ttl). |
| namespace
| str
| Target namespace. (requires Enterprise). |
| permissions_boundary_arn
| str
| The ARN of the AWS Permissions Boundary to attach to IAM users created in the role. |
@@ -136,7 +136,7 @@ Must be unique amongst siblings in the same scope
The path of the AWS Secret Backend the role belongs to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#backend AwsSecretBackendRole#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#backend AwsSecretBackendRole#backend}
---
@@ -146,7 +146,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Role credential type.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#credential_type AwsSecretBackendRole#credential_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#credential_type AwsSecretBackendRole#credential_type}
---
@@ -156,7 +156,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Unique name for the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#name AwsSecretBackendRole#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#name AwsSecretBackendRole#name}
---
@@ -168,7 +168,7 @@ The default TTL in seconds for STS credentials.
When a TTL is not specified when STS credentials are requested, and a default TTL is specified on the role, then this default TTL will be used. Valid only when credential_type is one of assumed_role or federation_token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#default_sts_ttl AwsSecretBackendRole#default_sts_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#default_sts_ttl AwsSecretBackendRole#default_sts_ttl}
---
@@ -178,7 +178,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
External ID to set for assume role creds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#external_id AwsSecretBackendRole#external_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#external_id AwsSecretBackendRole#external_id}
---
@@ -190,7 +190,7 @@ A list of IAM group names.
IAM users generated against this vault role will be added to these IAM Groups. For a credential type of assumed_role or federation_token, the policies sent to the corresponding AWS call (sts:AssumeRole or sts:GetFederation) will be the policies from each group in iam_groups combined with the policy_document and policy_arns parameters.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#iam_groups AwsSecretBackendRole#iam_groups}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#iam_groups AwsSecretBackendRole#iam_groups}
---
@@ -200,7 +200,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
A map of strings representing key/value pairs used as tags for any IAM user created by this role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#iam_tags AwsSecretBackendRole#iam_tags}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#iam_tags AwsSecretBackendRole#iam_tags}
---
@@ -208,7 +208,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#id AwsSecretBackendRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#id AwsSecretBackendRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -223,7 +223,7 @@ The max allowed TTL in seconds for STS credentials (credentials TTL are capped t
Valid only when credential_type is one of assumed_role or federation_token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#max_sts_ttl AwsSecretBackendRole#max_sts_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#max_sts_ttl AwsSecretBackendRole#max_sts_ttl}
---
@@ -233,7 +233,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#namespace AwsSecretBackendRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#namespace AwsSecretBackendRole#namespace}
---
@@ -245,7 +245,7 @@ The ARN of the AWS Permissions Boundary to attach to IAM users created in the ro
Valid only when credential_type is iam_user. If not specified, then no permissions boundary policy will be attached.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#permissions_boundary_arn AwsSecretBackendRole#permissions_boundary_arn}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#permissions_boundary_arn AwsSecretBackendRole#permissions_boundary_arn}
---
@@ -255,7 +255,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
ARN for an existing IAM policy the role should use.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#policy_arns AwsSecretBackendRole#policy_arns}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#policy_arns AwsSecretBackendRole#policy_arns}
---
@@ -265,7 +265,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
IAM policy the role should use in JSON format.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#policy_document AwsSecretBackendRole#policy_document}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#policy_document AwsSecretBackendRole#policy_document}
---
@@ -275,7 +275,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
ARNs of AWS roles allowed to be assumed. Only valid when credential_type is 'assumed_role'.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#role_arns AwsSecretBackendRole#role_arns}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#role_arns AwsSecretBackendRole#role_arns}
---
@@ -285,7 +285,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Session tags to be set for assume role creds created.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#session_tags AwsSecretBackendRole#session_tags}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#session_tags AwsSecretBackendRole#session_tags}
---
@@ -295,7 +295,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The path for the user name. Valid only when credential_type is iam_user. Default is /.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#user_path AwsSecretBackendRole#user_path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#user_path AwsSecretBackendRole#user_path}
---
@@ -859,7 +859,7 @@ The construct id used in the generated config for the AwsSecretBackendRole to im
The id of the existing AwsSecretBackendRole that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#import import section} in the documentation of this resource for the id to use
---
@@ -1458,7 +1458,7 @@ awsSecretBackendRole.AwsSecretBackendRoleConfig(
| external_id
| str
| External ID to set for assume role creds. |
| iam_groups
| typing.List[str]
| A list of IAM group names. |
| iam_tags
| typing.Mapping[str]
| A map of strings representing key/value pairs used as tags for any IAM user created by this role. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#id AwsSecretBackendRole#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#id AwsSecretBackendRole#id}. |
| max_sts_ttl
| typing.Union[int, float]
| The max allowed TTL in seconds for STS credentials (credentials TTL are capped to max_sts_ttl). |
| namespace
| str
| Target namespace. (requires Enterprise). |
| permissions_boundary_arn
| str
| The ARN of the AWS Permissions Boundary to attach to IAM users created in the role. |
@@ -1550,7 +1550,7 @@ backend: str
The path of the AWS Secret Backend the role belongs to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#backend AwsSecretBackendRole#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#backend AwsSecretBackendRole#backend}
---
@@ -1564,7 +1564,7 @@ credential_type: str
Role credential type.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#credential_type AwsSecretBackendRole#credential_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#credential_type AwsSecretBackendRole#credential_type}
---
@@ -1578,7 +1578,7 @@ name: str
Unique name for the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#name AwsSecretBackendRole#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#name AwsSecretBackendRole#name}
---
@@ -1594,7 +1594,7 @@ The default TTL in seconds for STS credentials.
When a TTL is not specified when STS credentials are requested, and a default TTL is specified on the role, then this default TTL will be used. Valid only when credential_type is one of assumed_role or federation_token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#default_sts_ttl AwsSecretBackendRole#default_sts_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#default_sts_ttl AwsSecretBackendRole#default_sts_ttl}
---
@@ -1608,7 +1608,7 @@ external_id: str
External ID to set for assume role creds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#external_id AwsSecretBackendRole#external_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#external_id AwsSecretBackendRole#external_id}
---
@@ -1624,7 +1624,7 @@ A list of IAM group names.
IAM users generated against this vault role will be added to these IAM Groups. For a credential type of assumed_role or federation_token, the policies sent to the corresponding AWS call (sts:AssumeRole or sts:GetFederation) will be the policies from each group in iam_groups combined with the policy_document and policy_arns parameters.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#iam_groups AwsSecretBackendRole#iam_groups}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#iam_groups AwsSecretBackendRole#iam_groups}
---
@@ -1638,7 +1638,7 @@ iam_tags: typing.Mapping[str]
A map of strings representing key/value pairs used as tags for any IAM user created by this role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#iam_tags AwsSecretBackendRole#iam_tags}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#iam_tags AwsSecretBackendRole#iam_tags}
---
@@ -1650,7 +1650,7 @@ id: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#id AwsSecretBackendRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#id AwsSecretBackendRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1669,7 +1669,7 @@ The max allowed TTL in seconds for STS credentials (credentials TTL are capped t
Valid only when credential_type is one of assumed_role or federation_token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#max_sts_ttl AwsSecretBackendRole#max_sts_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#max_sts_ttl AwsSecretBackendRole#max_sts_ttl}
---
@@ -1683,7 +1683,7 @@ namespace: str
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#namespace AwsSecretBackendRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#namespace AwsSecretBackendRole#namespace}
---
@@ -1699,7 +1699,7 @@ The ARN of the AWS Permissions Boundary to attach to IAM users created in the ro
Valid only when credential_type is iam_user. If not specified, then no permissions boundary policy will be attached.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#permissions_boundary_arn AwsSecretBackendRole#permissions_boundary_arn}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#permissions_boundary_arn AwsSecretBackendRole#permissions_boundary_arn}
---
@@ -1713,7 +1713,7 @@ policy_arns: typing.List[str]
ARN for an existing IAM policy the role should use.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#policy_arns AwsSecretBackendRole#policy_arns}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#policy_arns AwsSecretBackendRole#policy_arns}
---
@@ -1727,7 +1727,7 @@ policy_document: str
IAM policy the role should use in JSON format.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#policy_document AwsSecretBackendRole#policy_document}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#policy_document AwsSecretBackendRole#policy_document}
---
@@ -1741,7 +1741,7 @@ role_arns: typing.List[str]
ARNs of AWS roles allowed to be assumed. Only valid when credential_type is 'assumed_role'.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#role_arns AwsSecretBackendRole#role_arns}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#role_arns AwsSecretBackendRole#role_arns}
---
@@ -1755,7 +1755,7 @@ session_tags: typing.Mapping[str]
Session tags to be set for assume role creds created.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#session_tags AwsSecretBackendRole#session_tags}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#session_tags AwsSecretBackendRole#session_tags}
---
@@ -1769,7 +1769,7 @@ user_path: str
The path for the user name. Valid only when credential_type is iam_user. Default is /.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#user_path AwsSecretBackendRole#user_path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#user_path AwsSecretBackendRole#user_path}
---
diff --git a/docs/awsSecretBackendRole.typescript.md b/docs/awsSecretBackendRole.typescript.md
index 7b46217b..fc635db2 100644
--- a/docs/awsSecretBackendRole.typescript.md
+++ b/docs/awsSecretBackendRole.typescript.md
@@ -4,7 +4,7 @@
### AwsSecretBackendRole
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role vault_aws_secret_backend_role}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role vault_aws_secret_backend_role}.
#### Initializers
@@ -558,7 +558,7 @@ The construct id used in the generated config for the AwsSecretBackendRole to im
The id of the existing AwsSecretBackendRole that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#import import section} in the documentation of this resource for the id to use
---
@@ -1133,7 +1133,7 @@ const awsSecretBackendRoleConfig: awsSecretBackendRole.AwsSecretBackendRoleConfi
| externalId
| string
| External ID to set for assume role creds. |
| iamGroups
| string[]
| A list of IAM group names. |
| iamTags
| {[ key: string ]: string}
| A map of strings representing key/value pairs used as tags for any IAM user created by this role. |
-| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#id AwsSecretBackendRole#id}. |
+| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#id AwsSecretBackendRole#id}. |
| maxStsTtl
| number
| The max allowed TTL in seconds for STS credentials (credentials TTL are capped to max_sts_ttl). |
| namespace
| string
| Target namespace. (requires Enterprise). |
| permissionsBoundaryArn
| string
| The ARN of the AWS Permissions Boundary to attach to IAM users created in the role. |
@@ -1225,7 +1225,7 @@ public readonly backend: string;
The path of the AWS Secret Backend the role belongs to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#backend AwsSecretBackendRole#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#backend AwsSecretBackendRole#backend}
---
@@ -1239,7 +1239,7 @@ public readonly credentialType: string;
Role credential type.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#credential_type AwsSecretBackendRole#credential_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#credential_type AwsSecretBackendRole#credential_type}
---
@@ -1253,7 +1253,7 @@ public readonly name: string;
Unique name for the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#name AwsSecretBackendRole#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#name AwsSecretBackendRole#name}
---
@@ -1269,7 +1269,7 @@ The default TTL in seconds for STS credentials.
When a TTL is not specified when STS credentials are requested, and a default TTL is specified on the role, then this default TTL will be used. Valid only when credential_type is one of assumed_role or federation_token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#default_sts_ttl AwsSecretBackendRole#default_sts_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#default_sts_ttl AwsSecretBackendRole#default_sts_ttl}
---
@@ -1283,7 +1283,7 @@ public readonly externalId: string;
External ID to set for assume role creds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#external_id AwsSecretBackendRole#external_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#external_id AwsSecretBackendRole#external_id}
---
@@ -1299,7 +1299,7 @@ A list of IAM group names.
IAM users generated against this vault role will be added to these IAM Groups. For a credential type of assumed_role or federation_token, the policies sent to the corresponding AWS call (sts:AssumeRole or sts:GetFederation) will be the policies from each group in iam_groups combined with the policy_document and policy_arns parameters.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#iam_groups AwsSecretBackendRole#iam_groups}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#iam_groups AwsSecretBackendRole#iam_groups}
---
@@ -1313,7 +1313,7 @@ public readonly iamTags: {[ key: string ]: string};
A map of strings representing key/value pairs used as tags for any IAM user created by this role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#iam_tags AwsSecretBackendRole#iam_tags}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#iam_tags AwsSecretBackendRole#iam_tags}
---
@@ -1325,7 +1325,7 @@ public readonly id: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#id AwsSecretBackendRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#id AwsSecretBackendRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1344,7 +1344,7 @@ The max allowed TTL in seconds for STS credentials (credentials TTL are capped t
Valid only when credential_type is one of assumed_role or federation_token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#max_sts_ttl AwsSecretBackendRole#max_sts_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#max_sts_ttl AwsSecretBackendRole#max_sts_ttl}
---
@@ -1358,7 +1358,7 @@ public readonly namespace: string;
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#namespace AwsSecretBackendRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#namespace AwsSecretBackendRole#namespace}
---
@@ -1374,7 +1374,7 @@ The ARN of the AWS Permissions Boundary to attach to IAM users created in the ro
Valid only when credential_type is iam_user. If not specified, then no permissions boundary policy will be attached.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#permissions_boundary_arn AwsSecretBackendRole#permissions_boundary_arn}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#permissions_boundary_arn AwsSecretBackendRole#permissions_boundary_arn}
---
@@ -1388,7 +1388,7 @@ public readonly policyArns: string[];
ARN for an existing IAM policy the role should use.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#policy_arns AwsSecretBackendRole#policy_arns}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#policy_arns AwsSecretBackendRole#policy_arns}
---
@@ -1402,7 +1402,7 @@ public readonly policyDocument: string;
IAM policy the role should use in JSON format.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#policy_document AwsSecretBackendRole#policy_document}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#policy_document AwsSecretBackendRole#policy_document}
---
@@ -1416,7 +1416,7 @@ public readonly roleArns: string[];
ARNs of AWS roles allowed to be assumed. Only valid when credential_type is 'assumed_role'.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#role_arns AwsSecretBackendRole#role_arns}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#role_arns AwsSecretBackendRole#role_arns}
---
@@ -1430,7 +1430,7 @@ public readonly sessionTags: {[ key: string ]: string};
Session tags to be set for assume role creds created.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#session_tags AwsSecretBackendRole#session_tags}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#session_tags AwsSecretBackendRole#session_tags}
---
@@ -1444,7 +1444,7 @@ public readonly userPath: string;
The path for the user name. Valid only when credential_type is iam_user. Default is /.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#user_path AwsSecretBackendRole#user_path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#user_path AwsSecretBackendRole#user_path}
---
diff --git a/docs/awsSecretBackendStaticRole.csharp.md b/docs/awsSecretBackendStaticRole.csharp.md
index ae4d0ecb..3226765d 100644
--- a/docs/awsSecretBackendStaticRole.csharp.md
+++ b/docs/awsSecretBackendStaticRole.csharp.md
@@ -4,7 +4,7 @@
### AwsSecretBackendStaticRole
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role vault_aws_secret_backend_static_role}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role vault_aws_secret_backend_static_role}.
#### Initializers
@@ -488,7 +488,7 @@ The construct id used in the generated config for the AwsSecretBackendStaticRole
The id of the existing AwsSecretBackendStaticRole that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#import import section} in the documentation of this resource for the id to use
---
@@ -854,7 +854,7 @@ new AwsSecretBackendStaticRoleConfig {
| RotationPeriod
| double
| How often Vault should rotate the password of the user entry. |
| Username
| string
| The username of the existing AWS IAM user to manage password rotation for. |
| Backend
| string
| The path where the AWS secrets backend is mounted. |
-| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#id AwsSecretBackendStaticRole#id}. |
+| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#id AwsSecretBackendStaticRole#id}. |
| Namespace
| string
| Target namespace. (requires Enterprise). |
---
@@ -939,7 +939,7 @@ public string Name { get; set; }
Name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#name AwsSecretBackendStaticRole#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#name AwsSecretBackendStaticRole#name}
---
@@ -953,7 +953,7 @@ public double RotationPeriod { get; set; }
How often Vault should rotate the password of the user entry.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#rotation_period AwsSecretBackendStaticRole#rotation_period}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#rotation_period AwsSecretBackendStaticRole#rotation_period}
---
@@ -967,7 +967,7 @@ public string Username { get; set; }
The username of the existing AWS IAM user to manage password rotation for.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#username AwsSecretBackendStaticRole#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#username AwsSecretBackendStaticRole#username}
---
@@ -981,7 +981,7 @@ public string Backend { get; set; }
The path where the AWS secrets backend is mounted.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#backend AwsSecretBackendStaticRole#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#backend AwsSecretBackendStaticRole#backend}
---
@@ -993,7 +993,7 @@ public string Id { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#id AwsSecretBackendStaticRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#id AwsSecretBackendStaticRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1010,7 +1010,7 @@ public string Namespace { get; set; }
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#namespace AwsSecretBackendStaticRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#namespace AwsSecretBackendStaticRole#namespace}
---
diff --git a/docs/awsSecretBackendStaticRole.go.md b/docs/awsSecretBackendStaticRole.go.md
index 8aa04d76..6ea451ca 100644
--- a/docs/awsSecretBackendStaticRole.go.md
+++ b/docs/awsSecretBackendStaticRole.go.md
@@ -4,7 +4,7 @@
### AwsSecretBackendStaticRole
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role vault_aws_secret_backend_static_role}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role vault_aws_secret_backend_static_role}.
#### Initializers
@@ -488,7 +488,7 @@ The construct id used in the generated config for the AwsSecretBackendStaticRole
The id of the existing AwsSecretBackendStaticRole that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#import import section} in the documentation of this resource for the id to use
---
@@ -854,7 +854,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/awssecretbackendstati
| RotationPeriod
| *f64
| How often Vault should rotate the password of the user entry. |
| Username
| *string
| The username of the existing AWS IAM user to manage password rotation for. |
| Backend
| *string
| The path where the AWS secrets backend is mounted. |
-| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#id AwsSecretBackendStaticRole#id}. |
+| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#id AwsSecretBackendStaticRole#id}. |
| Namespace
| *string
| Target namespace. (requires Enterprise). |
---
@@ -939,7 +939,7 @@ Name *string
Name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#name AwsSecretBackendStaticRole#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#name AwsSecretBackendStaticRole#name}
---
@@ -953,7 +953,7 @@ RotationPeriod *f64
How often Vault should rotate the password of the user entry.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#rotation_period AwsSecretBackendStaticRole#rotation_period}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#rotation_period AwsSecretBackendStaticRole#rotation_period}
---
@@ -967,7 +967,7 @@ Username *string
The username of the existing AWS IAM user to manage password rotation for.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#username AwsSecretBackendStaticRole#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#username AwsSecretBackendStaticRole#username}
---
@@ -981,7 +981,7 @@ Backend *string
The path where the AWS secrets backend is mounted.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#backend AwsSecretBackendStaticRole#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#backend AwsSecretBackendStaticRole#backend}
---
@@ -993,7 +993,7 @@ Id *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#id AwsSecretBackendStaticRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#id AwsSecretBackendStaticRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1010,7 +1010,7 @@ Namespace *string
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#namespace AwsSecretBackendStaticRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#namespace AwsSecretBackendStaticRole#namespace}
---
diff --git a/docs/awsSecretBackendStaticRole.java.md b/docs/awsSecretBackendStaticRole.java.md
index ce0d3396..72770cef 100644
--- a/docs/awsSecretBackendStaticRole.java.md
+++ b/docs/awsSecretBackendStaticRole.java.md
@@ -4,7 +4,7 @@
### AwsSecretBackendStaticRole
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role vault_aws_secret_backend_static_role}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role vault_aws_secret_backend_static_role}.
#### Initializers
@@ -47,7 +47,7 @@ AwsSecretBackendStaticRole.Builder.create(Construct scope, java.lang.String id)
| rotationPeriod
| java.lang.Number
| How often Vault should rotate the password of the user entry. |
| username
| java.lang.String
| The username of the existing AWS IAM user to manage password rotation for. |
| backend
| java.lang.String
| The path where the AWS secrets backend is mounted. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#id AwsSecretBackendStaticRole#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#id AwsSecretBackendStaticRole#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
---
@@ -118,7 +118,7 @@ Must be unique amongst siblings in the same scope
Name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#name AwsSecretBackendStaticRole#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#name AwsSecretBackendStaticRole#name}
---
@@ -128,7 +128,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
How often Vault should rotate the password of the user entry.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#rotation_period AwsSecretBackendStaticRole#rotation_period}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#rotation_period AwsSecretBackendStaticRole#rotation_period}
---
@@ -138,7 +138,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The username of the existing AWS IAM user to manage password rotation for.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#username AwsSecretBackendStaticRole#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#username AwsSecretBackendStaticRole#username}
---
@@ -148,7 +148,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The path where the AWS secrets backend is mounted.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#backend AwsSecretBackendStaticRole#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#backend AwsSecretBackendStaticRole#backend}
---
@@ -156,7 +156,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#id AwsSecretBackendStaticRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#id AwsSecretBackendStaticRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -169,7 +169,7 @@ If you experience problems setting this value it might not be settable. Please t
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#namespace AwsSecretBackendStaticRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#namespace AwsSecretBackendStaticRole#namespace}
---
@@ -617,7 +617,7 @@ The construct id used in the generated config for the AwsSecretBackendStaticRole
The id of the existing AwsSecretBackendStaticRole that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#import import section} in the documentation of this resource for the id to use
---
@@ -987,7 +987,7 @@ AwsSecretBackendStaticRoleConfig.builder()
| rotationPeriod
| java.lang.Number
| How often Vault should rotate the password of the user entry. |
| username
| java.lang.String
| The username of the existing AWS IAM user to manage password rotation for. |
| backend
| java.lang.String
| The path where the AWS secrets backend is mounted. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#id AwsSecretBackendStaticRole#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#id AwsSecretBackendStaticRole#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
---
@@ -1072,7 +1072,7 @@ public java.lang.String getName();
Name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#name AwsSecretBackendStaticRole#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#name AwsSecretBackendStaticRole#name}
---
@@ -1086,7 +1086,7 @@ public java.lang.Number getRotationPeriod();
How often Vault should rotate the password of the user entry.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#rotation_period AwsSecretBackendStaticRole#rotation_period}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#rotation_period AwsSecretBackendStaticRole#rotation_period}
---
@@ -1100,7 +1100,7 @@ public java.lang.String getUsername();
The username of the existing AWS IAM user to manage password rotation for.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#username AwsSecretBackendStaticRole#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#username AwsSecretBackendStaticRole#username}
---
@@ -1114,7 +1114,7 @@ public java.lang.String getBackend();
The path where the AWS secrets backend is mounted.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#backend AwsSecretBackendStaticRole#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#backend AwsSecretBackendStaticRole#backend}
---
@@ -1126,7 +1126,7 @@ public java.lang.String getId();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#id AwsSecretBackendStaticRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#id AwsSecretBackendStaticRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1143,7 +1143,7 @@ public java.lang.String getNamespace();
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#namespace AwsSecretBackendStaticRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#namespace AwsSecretBackendStaticRole#namespace}
---
diff --git a/docs/awsSecretBackendStaticRole.python.md b/docs/awsSecretBackendStaticRole.python.md
index 0c55e82d..4d2418ad 100644
--- a/docs/awsSecretBackendStaticRole.python.md
+++ b/docs/awsSecretBackendStaticRole.python.md
@@ -4,7 +4,7 @@
### AwsSecretBackendStaticRole
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role vault_aws_secret_backend_static_role}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role vault_aws_secret_backend_static_role}.
#### Initializers
@@ -45,7 +45,7 @@ awsSecretBackendStaticRole.AwsSecretBackendStaticRole(
| rotation_period
| typing.Union[int, float]
| How often Vault should rotate the password of the user entry. |
| username
| str
| The username of the existing AWS IAM user to manage password rotation for. |
| backend
| str
| The path where the AWS secrets backend is mounted. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#id AwsSecretBackendStaticRole#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#id AwsSecretBackendStaticRole#id}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
---
@@ -116,7 +116,7 @@ Must be unique amongst siblings in the same scope
Name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#name AwsSecretBackendStaticRole#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#name AwsSecretBackendStaticRole#name}
---
@@ -126,7 +126,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
How often Vault should rotate the password of the user entry.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#rotation_period AwsSecretBackendStaticRole#rotation_period}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#rotation_period AwsSecretBackendStaticRole#rotation_period}
---
@@ -136,7 +136,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The username of the existing AWS IAM user to manage password rotation for.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#username AwsSecretBackendStaticRole#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#username AwsSecretBackendStaticRole#username}
---
@@ -146,7 +146,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The path where the AWS secrets backend is mounted.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#backend AwsSecretBackendStaticRole#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#backend AwsSecretBackendStaticRole#backend}
---
@@ -154,7 +154,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#id AwsSecretBackendStaticRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#id AwsSecretBackendStaticRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -167,7 +167,7 @@ If you experience problems setting this value it might not be settable. Please t
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#namespace AwsSecretBackendStaticRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#namespace AwsSecretBackendStaticRole#namespace}
---
@@ -661,7 +661,7 @@ The construct id used in the generated config for the AwsSecretBackendStaticRole
The id of the existing AwsSecretBackendStaticRole that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#import import section} in the documentation of this resource for the id to use
---
@@ -1027,7 +1027,7 @@ awsSecretBackendStaticRole.AwsSecretBackendStaticRoleConfig(
| rotation_period
| typing.Union[int, float]
| How often Vault should rotate the password of the user entry. |
| username
| str
| The username of the existing AWS IAM user to manage password rotation for. |
| backend
| str
| The path where the AWS secrets backend is mounted. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#id AwsSecretBackendStaticRole#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#id AwsSecretBackendStaticRole#id}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
---
@@ -1112,7 +1112,7 @@ name: str
Name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#name AwsSecretBackendStaticRole#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#name AwsSecretBackendStaticRole#name}
---
@@ -1126,7 +1126,7 @@ rotation_period: typing.Union[int, float]
How often Vault should rotate the password of the user entry.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#rotation_period AwsSecretBackendStaticRole#rotation_period}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#rotation_period AwsSecretBackendStaticRole#rotation_period}
---
@@ -1140,7 +1140,7 @@ username: str
The username of the existing AWS IAM user to manage password rotation for.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#username AwsSecretBackendStaticRole#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#username AwsSecretBackendStaticRole#username}
---
@@ -1154,7 +1154,7 @@ backend: str
The path where the AWS secrets backend is mounted.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#backend AwsSecretBackendStaticRole#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#backend AwsSecretBackendStaticRole#backend}
---
@@ -1166,7 +1166,7 @@ id: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#id AwsSecretBackendStaticRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#id AwsSecretBackendStaticRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1183,7 +1183,7 @@ namespace: str
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#namespace AwsSecretBackendStaticRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#namespace AwsSecretBackendStaticRole#namespace}
---
diff --git a/docs/awsSecretBackendStaticRole.typescript.md b/docs/awsSecretBackendStaticRole.typescript.md
index e882f678..f1559181 100644
--- a/docs/awsSecretBackendStaticRole.typescript.md
+++ b/docs/awsSecretBackendStaticRole.typescript.md
@@ -4,7 +4,7 @@
### AwsSecretBackendStaticRole
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role vault_aws_secret_backend_static_role}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role vault_aws_secret_backend_static_role}.
#### Initializers
@@ -488,7 +488,7 @@ The construct id used in the generated config for the AwsSecretBackendStaticRole
The id of the existing AwsSecretBackendStaticRole that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#import import section} in the documentation of this resource for the id to use
---
@@ -840,7 +840,7 @@ const awsSecretBackendStaticRoleConfig: awsSecretBackendStaticRole.AwsSecretBack
| rotationPeriod
| number
| How often Vault should rotate the password of the user entry. |
| username
| string
| The username of the existing AWS IAM user to manage password rotation for. |
| backend
| string
| The path where the AWS secrets backend is mounted. |
-| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#id AwsSecretBackendStaticRole#id}. |
+| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#id AwsSecretBackendStaticRole#id}. |
| namespace
| string
| Target namespace. (requires Enterprise). |
---
@@ -925,7 +925,7 @@ public readonly name: string;
Name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#name AwsSecretBackendStaticRole#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#name AwsSecretBackendStaticRole#name}
---
@@ -939,7 +939,7 @@ public readonly rotationPeriod: number;
How often Vault should rotate the password of the user entry.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#rotation_period AwsSecretBackendStaticRole#rotation_period}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#rotation_period AwsSecretBackendStaticRole#rotation_period}
---
@@ -953,7 +953,7 @@ public readonly username: string;
The username of the existing AWS IAM user to manage password rotation for.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#username AwsSecretBackendStaticRole#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#username AwsSecretBackendStaticRole#username}
---
@@ -967,7 +967,7 @@ public readonly backend: string;
The path where the AWS secrets backend is mounted.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#backend AwsSecretBackendStaticRole#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#backend AwsSecretBackendStaticRole#backend}
---
@@ -979,7 +979,7 @@ public readonly id: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#id AwsSecretBackendStaticRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#id AwsSecretBackendStaticRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -996,7 +996,7 @@ public readonly namespace: string;
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#namespace AwsSecretBackendStaticRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#namespace AwsSecretBackendStaticRole#namespace}
---
diff --git a/docs/azureAuthBackendConfig.csharp.md b/docs/azureAuthBackendConfig.csharp.md
index 872e37e3..765f0180 100644
--- a/docs/azureAuthBackendConfig.csharp.md
+++ b/docs/azureAuthBackendConfig.csharp.md
@@ -4,7 +4,7 @@
### AzureAuthBackendConfig
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config vault_azure_auth_backend_config}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config vault_azure_auth_backend_config}.
#### Initializers
@@ -523,7 +523,7 @@ The construct id used in the generated config for the AzureAuthBackendConfig to
The id of the existing AzureAuthBackendConfig that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#import import section} in the documentation of this resource for the id to use
---
@@ -983,7 +983,7 @@ new AzureAuthBackendConfigConfig {
| ClientId
| string
| The client id for credentials to query the Azure APIs. Currently read permissions to query compute resources are required. |
| ClientSecret
| string
| The client secret for credentials to query the Azure APIs. |
| Environment
| string
| The Azure cloud environment. Valid values: AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud, AzureGermanCloud. |
-| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#id AzureAuthBackendConfig#id}. |
+| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#id AzureAuthBackendConfig#id}. |
| IdentityTokenAudience
| string
| The audience claim value. |
| IdentityTokenTtl
| double
| The TTL of generated identity tokens in seconds. |
| Namespace
| string
| Target namespace. (requires Enterprise). |
@@ -1070,7 +1070,7 @@ public string Resource { get; set; }
The configured URL for the application registered in Azure Active Directory.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#resource AzureAuthBackendConfig#resource}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#resource AzureAuthBackendConfig#resource}
---
@@ -1084,7 +1084,7 @@ public string TenantId { get; set; }
The tenant id for the Azure Active Directory organization.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#tenant_id AzureAuthBackendConfig#tenant_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#tenant_id AzureAuthBackendConfig#tenant_id}
---
@@ -1098,7 +1098,7 @@ public string Backend { get; set; }
Unique name of the auth backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#backend AzureAuthBackendConfig#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#backend AzureAuthBackendConfig#backend}
---
@@ -1112,7 +1112,7 @@ public string ClientId { get; set; }
The client id for credentials to query the Azure APIs. Currently read permissions to query compute resources are required.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#client_id AzureAuthBackendConfig#client_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#client_id AzureAuthBackendConfig#client_id}
---
@@ -1126,7 +1126,7 @@ public string ClientSecret { get; set; }
The client secret for credentials to query the Azure APIs.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#client_secret AzureAuthBackendConfig#client_secret}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#client_secret AzureAuthBackendConfig#client_secret}
---
@@ -1140,7 +1140,7 @@ public string Environment { get; set; }
The Azure cloud environment. Valid values: AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud, AzureGermanCloud.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#environment AzureAuthBackendConfig#environment}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#environment AzureAuthBackendConfig#environment}
---
@@ -1152,7 +1152,7 @@ public string Id { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#id AzureAuthBackendConfig#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#id AzureAuthBackendConfig#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1169,7 +1169,7 @@ public string IdentityTokenAudience { get; set; }
The audience claim value.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#identity_token_audience AzureAuthBackendConfig#identity_token_audience}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#identity_token_audience AzureAuthBackendConfig#identity_token_audience}
---
@@ -1183,7 +1183,7 @@ public double IdentityTokenTtl { get; set; }
The TTL of generated identity tokens in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#identity_token_ttl AzureAuthBackendConfig#identity_token_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#identity_token_ttl AzureAuthBackendConfig#identity_token_ttl}
---
@@ -1197,7 +1197,7 @@ public string Namespace { get; set; }
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#namespace AzureAuthBackendConfig#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#namespace AzureAuthBackendConfig#namespace}
---
diff --git a/docs/azureAuthBackendConfig.go.md b/docs/azureAuthBackendConfig.go.md
index b319021f..5a9a80fe 100644
--- a/docs/azureAuthBackendConfig.go.md
+++ b/docs/azureAuthBackendConfig.go.md
@@ -4,7 +4,7 @@
### AzureAuthBackendConfig
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config vault_azure_auth_backend_config}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config vault_azure_auth_backend_config}.
#### Initializers
@@ -523,7 +523,7 @@ The construct id used in the generated config for the AzureAuthBackendConfig to
The id of the existing AzureAuthBackendConfig that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#import import section} in the documentation of this resource for the id to use
---
@@ -983,7 +983,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/azureauthbackendconfi
| ClientId
| *string
| The client id for credentials to query the Azure APIs. Currently read permissions to query compute resources are required. |
| ClientSecret
| *string
| The client secret for credentials to query the Azure APIs. |
| Environment
| *string
| The Azure cloud environment. Valid values: AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud, AzureGermanCloud. |
-| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#id AzureAuthBackendConfig#id}. |
+| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#id AzureAuthBackendConfig#id}. |
| IdentityTokenAudience
| *string
| The audience claim value. |
| IdentityTokenTtl
| *f64
| The TTL of generated identity tokens in seconds. |
| Namespace
| *string
| Target namespace. (requires Enterprise). |
@@ -1070,7 +1070,7 @@ Resource *string
The configured URL for the application registered in Azure Active Directory.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#resource AzureAuthBackendConfig#resource}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#resource AzureAuthBackendConfig#resource}
---
@@ -1084,7 +1084,7 @@ TenantId *string
The tenant id for the Azure Active Directory organization.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#tenant_id AzureAuthBackendConfig#tenant_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#tenant_id AzureAuthBackendConfig#tenant_id}
---
@@ -1098,7 +1098,7 @@ Backend *string
Unique name of the auth backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#backend AzureAuthBackendConfig#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#backend AzureAuthBackendConfig#backend}
---
@@ -1112,7 +1112,7 @@ ClientId *string
The client id for credentials to query the Azure APIs. Currently read permissions to query compute resources are required.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#client_id AzureAuthBackendConfig#client_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#client_id AzureAuthBackendConfig#client_id}
---
@@ -1126,7 +1126,7 @@ ClientSecret *string
The client secret for credentials to query the Azure APIs.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#client_secret AzureAuthBackendConfig#client_secret}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#client_secret AzureAuthBackendConfig#client_secret}
---
@@ -1140,7 +1140,7 @@ Environment *string
The Azure cloud environment. Valid values: AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud, AzureGermanCloud.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#environment AzureAuthBackendConfig#environment}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#environment AzureAuthBackendConfig#environment}
---
@@ -1152,7 +1152,7 @@ Id *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#id AzureAuthBackendConfig#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#id AzureAuthBackendConfig#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1169,7 +1169,7 @@ IdentityTokenAudience *string
The audience claim value.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#identity_token_audience AzureAuthBackendConfig#identity_token_audience}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#identity_token_audience AzureAuthBackendConfig#identity_token_audience}
---
@@ -1183,7 +1183,7 @@ IdentityTokenTtl *f64
The TTL of generated identity tokens in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#identity_token_ttl AzureAuthBackendConfig#identity_token_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#identity_token_ttl AzureAuthBackendConfig#identity_token_ttl}
---
@@ -1197,7 +1197,7 @@ Namespace *string
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#namespace AzureAuthBackendConfig#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#namespace AzureAuthBackendConfig#namespace}
---
diff --git a/docs/azureAuthBackendConfig.java.md b/docs/azureAuthBackendConfig.java.md
index b61c20b8..2a0065bd 100644
--- a/docs/azureAuthBackendConfig.java.md
+++ b/docs/azureAuthBackendConfig.java.md
@@ -4,7 +4,7 @@
### AzureAuthBackendConfig
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config vault_azure_auth_backend_config}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config vault_azure_auth_backend_config}.
#### Initializers
@@ -53,7 +53,7 @@ AzureAuthBackendConfig.Builder.create(Construct scope, java.lang.String id)
| clientId
| java.lang.String
| The client id for credentials to query the Azure APIs. Currently read permissions to query compute resources are required. |
| clientSecret
| java.lang.String
| The client secret for credentials to query the Azure APIs. |
| environment
| java.lang.String
| The Azure cloud environment. Valid values: AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud, AzureGermanCloud. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#id AzureAuthBackendConfig#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#id AzureAuthBackendConfig#id}. |
| identityTokenAudience
| java.lang.String
| The audience claim value. |
| identityTokenTtl
| java.lang.Number
| The TTL of generated identity tokens in seconds. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
@@ -126,7 +126,7 @@ Must be unique amongst siblings in the same scope
The configured URL for the application registered in Azure Active Directory.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#resource AzureAuthBackendConfig#resource}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#resource AzureAuthBackendConfig#resource}
---
@@ -136,7 +136,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The tenant id for the Azure Active Directory organization.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#tenant_id AzureAuthBackendConfig#tenant_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#tenant_id AzureAuthBackendConfig#tenant_id}
---
@@ -146,7 +146,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Unique name of the auth backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#backend AzureAuthBackendConfig#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#backend AzureAuthBackendConfig#backend}
---
@@ -156,7 +156,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The client id for credentials to query the Azure APIs. Currently read permissions to query compute resources are required.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#client_id AzureAuthBackendConfig#client_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#client_id AzureAuthBackendConfig#client_id}
---
@@ -166,7 +166,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The client secret for credentials to query the Azure APIs.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#client_secret AzureAuthBackendConfig#client_secret}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#client_secret AzureAuthBackendConfig#client_secret}
---
@@ -176,7 +176,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The Azure cloud environment. Valid values: AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud, AzureGermanCloud.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#environment AzureAuthBackendConfig#environment}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#environment AzureAuthBackendConfig#environment}
---
@@ -184,7 +184,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#id AzureAuthBackendConfig#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#id AzureAuthBackendConfig#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -197,7 +197,7 @@ If you experience problems setting this value it might not be settable. Please t
The audience claim value.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#identity_token_audience AzureAuthBackendConfig#identity_token_audience}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#identity_token_audience AzureAuthBackendConfig#identity_token_audience}
---
@@ -207,7 +207,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The TTL of generated identity tokens in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#identity_token_ttl AzureAuthBackendConfig#identity_token_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#identity_token_ttl AzureAuthBackendConfig#identity_token_ttl}
---
@@ -217,7 +217,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#namespace AzureAuthBackendConfig#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#namespace AzureAuthBackendConfig#namespace}
---
@@ -700,7 +700,7 @@ The construct id used in the generated config for the AzureAuthBackendConfig to
The id of the existing AzureAuthBackendConfig that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#import import section} in the documentation of this resource for the id to use
---
@@ -1164,7 +1164,7 @@ AzureAuthBackendConfigConfig.builder()
| clientId
| java.lang.String
| The client id for credentials to query the Azure APIs. Currently read permissions to query compute resources are required. |
| clientSecret
| java.lang.String
| The client secret for credentials to query the Azure APIs. |
| environment
| java.lang.String
| The Azure cloud environment. Valid values: AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud, AzureGermanCloud. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#id AzureAuthBackendConfig#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#id AzureAuthBackendConfig#id}. |
| identityTokenAudience
| java.lang.String
| The audience claim value. |
| identityTokenTtl
| java.lang.Number
| The TTL of generated identity tokens in seconds. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
@@ -1251,7 +1251,7 @@ public java.lang.String getResource();
The configured URL for the application registered in Azure Active Directory.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#resource AzureAuthBackendConfig#resource}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#resource AzureAuthBackendConfig#resource}
---
@@ -1265,7 +1265,7 @@ public java.lang.String getTenantId();
The tenant id for the Azure Active Directory organization.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#tenant_id AzureAuthBackendConfig#tenant_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#tenant_id AzureAuthBackendConfig#tenant_id}
---
@@ -1279,7 +1279,7 @@ public java.lang.String getBackend();
Unique name of the auth backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#backend AzureAuthBackendConfig#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#backend AzureAuthBackendConfig#backend}
---
@@ -1293,7 +1293,7 @@ public java.lang.String getClientId();
The client id for credentials to query the Azure APIs. Currently read permissions to query compute resources are required.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#client_id AzureAuthBackendConfig#client_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#client_id AzureAuthBackendConfig#client_id}
---
@@ -1307,7 +1307,7 @@ public java.lang.String getClientSecret();
The client secret for credentials to query the Azure APIs.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#client_secret AzureAuthBackendConfig#client_secret}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#client_secret AzureAuthBackendConfig#client_secret}
---
@@ -1321,7 +1321,7 @@ public java.lang.String getEnvironment();
The Azure cloud environment. Valid values: AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud, AzureGermanCloud.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#environment AzureAuthBackendConfig#environment}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#environment AzureAuthBackendConfig#environment}
---
@@ -1333,7 +1333,7 @@ public java.lang.String getId();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#id AzureAuthBackendConfig#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#id AzureAuthBackendConfig#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1350,7 +1350,7 @@ public java.lang.String getIdentityTokenAudience();
The audience claim value.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#identity_token_audience AzureAuthBackendConfig#identity_token_audience}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#identity_token_audience AzureAuthBackendConfig#identity_token_audience}
---
@@ -1364,7 +1364,7 @@ public java.lang.Number getIdentityTokenTtl();
The TTL of generated identity tokens in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#identity_token_ttl AzureAuthBackendConfig#identity_token_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#identity_token_ttl AzureAuthBackendConfig#identity_token_ttl}
---
@@ -1378,7 +1378,7 @@ public java.lang.String getNamespace();
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#namespace AzureAuthBackendConfig#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#namespace AzureAuthBackendConfig#namespace}
---
diff --git a/docs/azureAuthBackendConfig.python.md b/docs/azureAuthBackendConfig.python.md
index 2993a997..697f80b1 100644
--- a/docs/azureAuthBackendConfig.python.md
+++ b/docs/azureAuthBackendConfig.python.md
@@ -4,7 +4,7 @@
### AzureAuthBackendConfig
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config vault_azure_auth_backend_config}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config vault_azure_auth_backend_config}.
#### Initializers
@@ -51,7 +51,7 @@ azureAuthBackendConfig.AzureAuthBackendConfig(
| client_id
| str
| The client id for credentials to query the Azure APIs. Currently read permissions to query compute resources are required. |
| client_secret
| str
| The client secret for credentials to query the Azure APIs. |
| environment
| str
| The Azure cloud environment. Valid values: AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud, AzureGermanCloud. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#id AzureAuthBackendConfig#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#id AzureAuthBackendConfig#id}. |
| identity_token_audience
| str
| The audience claim value. |
| identity_token_ttl
| typing.Union[int, float]
| The TTL of generated identity tokens in seconds. |
| namespace
| str
| Target namespace. (requires Enterprise). |
@@ -124,7 +124,7 @@ Must be unique amongst siblings in the same scope
The configured URL for the application registered in Azure Active Directory.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#resource AzureAuthBackendConfig#resource}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#resource AzureAuthBackendConfig#resource}
---
@@ -134,7 +134,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The tenant id for the Azure Active Directory organization.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#tenant_id AzureAuthBackendConfig#tenant_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#tenant_id AzureAuthBackendConfig#tenant_id}
---
@@ -144,7 +144,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Unique name of the auth backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#backend AzureAuthBackendConfig#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#backend AzureAuthBackendConfig#backend}
---
@@ -154,7 +154,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The client id for credentials to query the Azure APIs. Currently read permissions to query compute resources are required.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#client_id AzureAuthBackendConfig#client_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#client_id AzureAuthBackendConfig#client_id}
---
@@ -164,7 +164,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The client secret for credentials to query the Azure APIs.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#client_secret AzureAuthBackendConfig#client_secret}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#client_secret AzureAuthBackendConfig#client_secret}
---
@@ -174,7 +174,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The Azure cloud environment. Valid values: AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud, AzureGermanCloud.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#environment AzureAuthBackendConfig#environment}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#environment AzureAuthBackendConfig#environment}
---
@@ -182,7 +182,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#id AzureAuthBackendConfig#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#id AzureAuthBackendConfig#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -195,7 +195,7 @@ If you experience problems setting this value it might not be settable. Please t
The audience claim value.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#identity_token_audience AzureAuthBackendConfig#identity_token_audience}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#identity_token_audience AzureAuthBackendConfig#identity_token_audience}
---
@@ -205,7 +205,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The TTL of generated identity tokens in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#identity_token_ttl AzureAuthBackendConfig#identity_token_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#identity_token_ttl AzureAuthBackendConfig#identity_token_ttl}
---
@@ -215,7 +215,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#namespace AzureAuthBackendConfig#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#namespace AzureAuthBackendConfig#namespace}
---
@@ -744,7 +744,7 @@ The construct id used in the generated config for the AzureAuthBackendConfig to
The id of the existing AzureAuthBackendConfig that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#import import section} in the documentation of this resource for the id to use
---
@@ -1204,7 +1204,7 @@ azureAuthBackendConfig.AzureAuthBackendConfigConfig(
| client_id
| str
| The client id for credentials to query the Azure APIs. Currently read permissions to query compute resources are required. |
| client_secret
| str
| The client secret for credentials to query the Azure APIs. |
| environment
| str
| The Azure cloud environment. Valid values: AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud, AzureGermanCloud. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#id AzureAuthBackendConfig#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#id AzureAuthBackendConfig#id}. |
| identity_token_audience
| str
| The audience claim value. |
| identity_token_ttl
| typing.Union[int, float]
| The TTL of generated identity tokens in seconds. |
| namespace
| str
| Target namespace. (requires Enterprise). |
@@ -1291,7 +1291,7 @@ resource: str
The configured URL for the application registered in Azure Active Directory.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#resource AzureAuthBackendConfig#resource}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#resource AzureAuthBackendConfig#resource}
---
@@ -1305,7 +1305,7 @@ tenant_id: str
The tenant id for the Azure Active Directory organization.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#tenant_id AzureAuthBackendConfig#tenant_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#tenant_id AzureAuthBackendConfig#tenant_id}
---
@@ -1319,7 +1319,7 @@ backend: str
Unique name of the auth backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#backend AzureAuthBackendConfig#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#backend AzureAuthBackendConfig#backend}
---
@@ -1333,7 +1333,7 @@ client_id: str
The client id for credentials to query the Azure APIs. Currently read permissions to query compute resources are required.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#client_id AzureAuthBackendConfig#client_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#client_id AzureAuthBackendConfig#client_id}
---
@@ -1347,7 +1347,7 @@ client_secret: str
The client secret for credentials to query the Azure APIs.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#client_secret AzureAuthBackendConfig#client_secret}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#client_secret AzureAuthBackendConfig#client_secret}
---
@@ -1361,7 +1361,7 @@ environment: str
The Azure cloud environment. Valid values: AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud, AzureGermanCloud.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#environment AzureAuthBackendConfig#environment}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#environment AzureAuthBackendConfig#environment}
---
@@ -1373,7 +1373,7 @@ id: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#id AzureAuthBackendConfig#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#id AzureAuthBackendConfig#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1390,7 +1390,7 @@ identity_token_audience: str
The audience claim value.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#identity_token_audience AzureAuthBackendConfig#identity_token_audience}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#identity_token_audience AzureAuthBackendConfig#identity_token_audience}
---
@@ -1404,7 +1404,7 @@ identity_token_ttl: typing.Union[int, float]
The TTL of generated identity tokens in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#identity_token_ttl AzureAuthBackendConfig#identity_token_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#identity_token_ttl AzureAuthBackendConfig#identity_token_ttl}
---
@@ -1418,7 +1418,7 @@ namespace: str
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#namespace AzureAuthBackendConfig#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#namespace AzureAuthBackendConfig#namespace}
---
diff --git a/docs/azureAuthBackendConfig.typescript.md b/docs/azureAuthBackendConfig.typescript.md
index 8582dcfb..30dd159e 100644
--- a/docs/azureAuthBackendConfig.typescript.md
+++ b/docs/azureAuthBackendConfig.typescript.md
@@ -4,7 +4,7 @@
### AzureAuthBackendConfig
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config vault_azure_auth_backend_config}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config vault_azure_auth_backend_config}.
#### Initializers
@@ -523,7 +523,7 @@ The construct id used in the generated config for the AzureAuthBackendConfig to
The id of the existing AzureAuthBackendConfig that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#import import section} in the documentation of this resource for the id to use
---
@@ -965,7 +965,7 @@ const azureAuthBackendConfigConfig: azureAuthBackendConfig.AzureAuthBackendConfi
| clientId
| string
| The client id for credentials to query the Azure APIs. Currently read permissions to query compute resources are required. |
| clientSecret
| string
| The client secret for credentials to query the Azure APIs. |
| environment
| string
| The Azure cloud environment. Valid values: AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud, AzureGermanCloud. |
-| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#id AzureAuthBackendConfig#id}. |
+| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#id AzureAuthBackendConfig#id}. |
| identityTokenAudience
| string
| The audience claim value. |
| identityTokenTtl
| number
| The TTL of generated identity tokens in seconds. |
| namespace
| string
| Target namespace. (requires Enterprise). |
@@ -1052,7 +1052,7 @@ public readonly resource: string;
The configured URL for the application registered in Azure Active Directory.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#resource AzureAuthBackendConfig#resource}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#resource AzureAuthBackendConfig#resource}
---
@@ -1066,7 +1066,7 @@ public readonly tenantId: string;
The tenant id for the Azure Active Directory organization.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#tenant_id AzureAuthBackendConfig#tenant_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#tenant_id AzureAuthBackendConfig#tenant_id}
---
@@ -1080,7 +1080,7 @@ public readonly backend: string;
Unique name of the auth backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#backend AzureAuthBackendConfig#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#backend AzureAuthBackendConfig#backend}
---
@@ -1094,7 +1094,7 @@ public readonly clientId: string;
The client id for credentials to query the Azure APIs. Currently read permissions to query compute resources are required.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#client_id AzureAuthBackendConfig#client_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#client_id AzureAuthBackendConfig#client_id}
---
@@ -1108,7 +1108,7 @@ public readonly clientSecret: string;
The client secret for credentials to query the Azure APIs.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#client_secret AzureAuthBackendConfig#client_secret}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#client_secret AzureAuthBackendConfig#client_secret}
---
@@ -1122,7 +1122,7 @@ public readonly environment: string;
The Azure cloud environment. Valid values: AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud, AzureGermanCloud.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#environment AzureAuthBackendConfig#environment}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#environment AzureAuthBackendConfig#environment}
---
@@ -1134,7 +1134,7 @@ public readonly id: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#id AzureAuthBackendConfig#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#id AzureAuthBackendConfig#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1151,7 +1151,7 @@ public readonly identityTokenAudience: string;
The audience claim value.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#identity_token_audience AzureAuthBackendConfig#identity_token_audience}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#identity_token_audience AzureAuthBackendConfig#identity_token_audience}
---
@@ -1165,7 +1165,7 @@ public readonly identityTokenTtl: number;
The TTL of generated identity tokens in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#identity_token_ttl AzureAuthBackendConfig#identity_token_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#identity_token_ttl AzureAuthBackendConfig#identity_token_ttl}
---
@@ -1179,7 +1179,7 @@ public readonly namespace: string;
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#namespace AzureAuthBackendConfig#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#namespace AzureAuthBackendConfig#namespace}
---
diff --git a/docs/azureAuthBackendRole.csharp.md b/docs/azureAuthBackendRole.csharp.md
index 1c5aac4c..d7ba9e6c 100644
--- a/docs/azureAuthBackendRole.csharp.md
+++ b/docs/azureAuthBackendRole.csharp.md
@@ -4,7 +4,7 @@
### AzureAuthBackendRole
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role vault_azure_auth_backend_role}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role vault_azure_auth_backend_role}.
#### Initializers
@@ -593,7 +593,7 @@ The construct id used in the generated config for the AzureAuthBackendRole to im
The id of the existing AzureAuthBackendRole that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#import import section} in the documentation of this resource for the id to use
---
@@ -1262,7 +1262,7 @@ new AzureAuthBackendRoleConfig {
| BoundScaleSets
| string[]
| The list of scale set names that the login is restricted to. |
| BoundServicePrincipalIds
| string[]
| The list of Service Principal IDs that login is restricted to. |
| BoundSubscriptionIds
| string[]
| The list of subscription IDs that login is restricted to. |
-| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#id AzureAuthBackendRole#id}. |
+| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#id AzureAuthBackendRole#id}. |
| Namespace
| string
| Target namespace. (requires Enterprise). |
| TokenBoundCidrs
| string[]
| Specifies the blocks of IP addresses which are allowed to use the generated token. |
| TokenExplicitMaxTtl
| double
| Generated Token's Explicit Maximum TTL in seconds. |
@@ -1356,7 +1356,7 @@ public string Role { get; set; }
Name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#role AzureAuthBackendRole#role}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#role AzureAuthBackendRole#role}
---
@@ -1370,7 +1370,7 @@ public string Backend { get; set; }
Unique name of the auth backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#backend AzureAuthBackendRole#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#backend AzureAuthBackendRole#backend}
---
@@ -1384,7 +1384,7 @@ public string[] BoundGroupIds { get; set; }
The list of group ids that login is restricted to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#bound_group_ids AzureAuthBackendRole#bound_group_ids}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#bound_group_ids AzureAuthBackendRole#bound_group_ids}
---
@@ -1398,7 +1398,7 @@ public string[] BoundLocations { get; set; }
The list of locations that login is restricted to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#bound_locations AzureAuthBackendRole#bound_locations}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#bound_locations AzureAuthBackendRole#bound_locations}
---
@@ -1412,7 +1412,7 @@ public string[] BoundResourceGroups { get; set; }
The list of resource groups that login is restricted to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#bound_resource_groups AzureAuthBackendRole#bound_resource_groups}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#bound_resource_groups AzureAuthBackendRole#bound_resource_groups}
---
@@ -1426,7 +1426,7 @@ public string[] BoundScaleSets { get; set; }
The list of scale set names that the login is restricted to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#bound_scale_sets AzureAuthBackendRole#bound_scale_sets}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#bound_scale_sets AzureAuthBackendRole#bound_scale_sets}
---
@@ -1440,7 +1440,7 @@ public string[] BoundServicePrincipalIds { get; set; }
The list of Service Principal IDs that login is restricted to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#bound_service_principal_ids AzureAuthBackendRole#bound_service_principal_ids}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#bound_service_principal_ids AzureAuthBackendRole#bound_service_principal_ids}
---
@@ -1454,7 +1454,7 @@ public string[] BoundSubscriptionIds { get; set; }
The list of subscription IDs that login is restricted to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#bound_subscription_ids AzureAuthBackendRole#bound_subscription_ids}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#bound_subscription_ids AzureAuthBackendRole#bound_subscription_ids}
---
@@ -1466,7 +1466,7 @@ public string Id { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#id AzureAuthBackendRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#id AzureAuthBackendRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1483,7 +1483,7 @@ public string Namespace { get; set; }
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#namespace AzureAuthBackendRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#namespace AzureAuthBackendRole#namespace}
---
@@ -1497,7 +1497,7 @@ public string[] TokenBoundCidrs { get; set; }
Specifies the blocks of IP addresses which are allowed to use the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_bound_cidrs AzureAuthBackendRole#token_bound_cidrs}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_bound_cidrs AzureAuthBackendRole#token_bound_cidrs}
---
@@ -1511,7 +1511,7 @@ public double TokenExplicitMaxTtl { get; set; }
Generated Token's Explicit Maximum TTL in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_explicit_max_ttl AzureAuthBackendRole#token_explicit_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_explicit_max_ttl AzureAuthBackendRole#token_explicit_max_ttl}
---
@@ -1525,7 +1525,7 @@ public double TokenMaxTtl { get; set; }
The maximum lifetime of the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_max_ttl AzureAuthBackendRole#token_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_max_ttl AzureAuthBackendRole#token_max_ttl}
---
@@ -1539,7 +1539,7 @@ public object TokenNoDefaultPolicy { get; set; }
If true, the 'default' policy will not automatically be added to generated tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_no_default_policy AzureAuthBackendRole#token_no_default_policy}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_no_default_policy AzureAuthBackendRole#token_no_default_policy}
---
@@ -1553,7 +1553,7 @@ public double TokenNumUses { get; set; }
The maximum number of times a token may be used, a value of zero means unlimited.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_num_uses AzureAuthBackendRole#token_num_uses}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_num_uses AzureAuthBackendRole#token_num_uses}
---
@@ -1567,7 +1567,7 @@ public double TokenPeriod { get; set; }
Generated Token's Period.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_period AzureAuthBackendRole#token_period}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_period AzureAuthBackendRole#token_period}
---
@@ -1581,7 +1581,7 @@ public string[] TokenPolicies { get; set; }
Generated Token's Policies.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_policies AzureAuthBackendRole#token_policies}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_policies AzureAuthBackendRole#token_policies}
---
@@ -1595,7 +1595,7 @@ public double TokenTtl { get; set; }
The initial ttl of the token to generate in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_ttl AzureAuthBackendRole#token_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_ttl AzureAuthBackendRole#token_ttl}
---
@@ -1609,7 +1609,7 @@ public string TokenType { get; set; }
The type of token to generate, service or batch.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_type AzureAuthBackendRole#token_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_type AzureAuthBackendRole#token_type}
---
diff --git a/docs/azureAuthBackendRole.go.md b/docs/azureAuthBackendRole.go.md
index 171eb183..59e4221d 100644
--- a/docs/azureAuthBackendRole.go.md
+++ b/docs/azureAuthBackendRole.go.md
@@ -4,7 +4,7 @@
### AzureAuthBackendRole
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role vault_azure_auth_backend_role}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role vault_azure_auth_backend_role}.
#### Initializers
@@ -593,7 +593,7 @@ The construct id used in the generated config for the AzureAuthBackendRole to im
The id of the existing AzureAuthBackendRole that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#import import section} in the documentation of this resource for the id to use
---
@@ -1262,7 +1262,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/azureauthbackendrole"
| BoundScaleSets
| *[]*string
| The list of scale set names that the login is restricted to. |
| BoundServicePrincipalIds
| *[]*string
| The list of Service Principal IDs that login is restricted to. |
| BoundSubscriptionIds
| *[]*string
| The list of subscription IDs that login is restricted to. |
-| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#id AzureAuthBackendRole#id}. |
+| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#id AzureAuthBackendRole#id}. |
| Namespace
| *string
| Target namespace. (requires Enterprise). |
| TokenBoundCidrs
| *[]*string
| Specifies the blocks of IP addresses which are allowed to use the generated token. |
| TokenExplicitMaxTtl
| *f64
| Generated Token's Explicit Maximum TTL in seconds. |
@@ -1356,7 +1356,7 @@ Role *string
Name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#role AzureAuthBackendRole#role}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#role AzureAuthBackendRole#role}
---
@@ -1370,7 +1370,7 @@ Backend *string
Unique name of the auth backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#backend AzureAuthBackendRole#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#backend AzureAuthBackendRole#backend}
---
@@ -1384,7 +1384,7 @@ BoundGroupIds *[]*string
The list of group ids that login is restricted to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#bound_group_ids AzureAuthBackendRole#bound_group_ids}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#bound_group_ids AzureAuthBackendRole#bound_group_ids}
---
@@ -1398,7 +1398,7 @@ BoundLocations *[]*string
The list of locations that login is restricted to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#bound_locations AzureAuthBackendRole#bound_locations}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#bound_locations AzureAuthBackendRole#bound_locations}
---
@@ -1412,7 +1412,7 @@ BoundResourceGroups *[]*string
The list of resource groups that login is restricted to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#bound_resource_groups AzureAuthBackendRole#bound_resource_groups}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#bound_resource_groups AzureAuthBackendRole#bound_resource_groups}
---
@@ -1426,7 +1426,7 @@ BoundScaleSets *[]*string
The list of scale set names that the login is restricted to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#bound_scale_sets AzureAuthBackendRole#bound_scale_sets}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#bound_scale_sets AzureAuthBackendRole#bound_scale_sets}
---
@@ -1440,7 +1440,7 @@ BoundServicePrincipalIds *[]*string
The list of Service Principal IDs that login is restricted to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#bound_service_principal_ids AzureAuthBackendRole#bound_service_principal_ids}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#bound_service_principal_ids AzureAuthBackendRole#bound_service_principal_ids}
---
@@ -1454,7 +1454,7 @@ BoundSubscriptionIds *[]*string
The list of subscription IDs that login is restricted to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#bound_subscription_ids AzureAuthBackendRole#bound_subscription_ids}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#bound_subscription_ids AzureAuthBackendRole#bound_subscription_ids}
---
@@ -1466,7 +1466,7 @@ Id *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#id AzureAuthBackendRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#id AzureAuthBackendRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1483,7 +1483,7 @@ Namespace *string
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#namespace AzureAuthBackendRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#namespace AzureAuthBackendRole#namespace}
---
@@ -1497,7 +1497,7 @@ TokenBoundCidrs *[]*string
Specifies the blocks of IP addresses which are allowed to use the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_bound_cidrs AzureAuthBackendRole#token_bound_cidrs}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_bound_cidrs AzureAuthBackendRole#token_bound_cidrs}
---
@@ -1511,7 +1511,7 @@ TokenExplicitMaxTtl *f64
Generated Token's Explicit Maximum TTL in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_explicit_max_ttl AzureAuthBackendRole#token_explicit_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_explicit_max_ttl AzureAuthBackendRole#token_explicit_max_ttl}
---
@@ -1525,7 +1525,7 @@ TokenMaxTtl *f64
The maximum lifetime of the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_max_ttl AzureAuthBackendRole#token_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_max_ttl AzureAuthBackendRole#token_max_ttl}
---
@@ -1539,7 +1539,7 @@ TokenNoDefaultPolicy interface{}
If true, the 'default' policy will not automatically be added to generated tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_no_default_policy AzureAuthBackendRole#token_no_default_policy}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_no_default_policy AzureAuthBackendRole#token_no_default_policy}
---
@@ -1553,7 +1553,7 @@ TokenNumUses *f64
The maximum number of times a token may be used, a value of zero means unlimited.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_num_uses AzureAuthBackendRole#token_num_uses}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_num_uses AzureAuthBackendRole#token_num_uses}
---
@@ -1567,7 +1567,7 @@ TokenPeriod *f64
Generated Token's Period.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_period AzureAuthBackendRole#token_period}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_period AzureAuthBackendRole#token_period}
---
@@ -1581,7 +1581,7 @@ TokenPolicies *[]*string
Generated Token's Policies.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_policies AzureAuthBackendRole#token_policies}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_policies AzureAuthBackendRole#token_policies}
---
@@ -1595,7 +1595,7 @@ TokenTtl *f64
The initial ttl of the token to generate in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_ttl AzureAuthBackendRole#token_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_ttl AzureAuthBackendRole#token_ttl}
---
@@ -1609,7 +1609,7 @@ TokenType *string
The type of token to generate, service or batch.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_type AzureAuthBackendRole#token_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_type AzureAuthBackendRole#token_type}
---
diff --git a/docs/azureAuthBackendRole.java.md b/docs/azureAuthBackendRole.java.md
index 4c2aaaa0..638975bb 100644
--- a/docs/azureAuthBackendRole.java.md
+++ b/docs/azureAuthBackendRole.java.md
@@ -4,7 +4,7 @@
### AzureAuthBackendRole
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role vault_azure_auth_backend_role}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role vault_azure_auth_backend_role}.
#### Initializers
@@ -65,7 +65,7 @@ AzureAuthBackendRole.Builder.create(Construct scope, java.lang.String id)
| boundScaleSets
| java.util.List
| The list of scale set names that the login is restricted to. |
| boundServicePrincipalIds
| java.util.List
| The list of Service Principal IDs that login is restricted to. |
| boundSubscriptionIds
| java.util.List
| The list of subscription IDs that login is restricted to. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#id AzureAuthBackendRole#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#id AzureAuthBackendRole#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
| tokenBoundCidrs
| java.util.List
| Specifies the blocks of IP addresses which are allowed to use the generated token. |
| tokenExplicitMaxTtl
| java.lang.Number
| Generated Token's Explicit Maximum TTL in seconds. |
@@ -145,7 +145,7 @@ Must be unique amongst siblings in the same scope
Name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#role AzureAuthBackendRole#role}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#role AzureAuthBackendRole#role}
---
@@ -155,7 +155,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Unique name of the auth backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#backend AzureAuthBackendRole#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#backend AzureAuthBackendRole#backend}
---
@@ -165,7 +165,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The list of group ids that login is restricted to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#bound_group_ids AzureAuthBackendRole#bound_group_ids}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#bound_group_ids AzureAuthBackendRole#bound_group_ids}
---
@@ -175,7 +175,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The list of locations that login is restricted to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#bound_locations AzureAuthBackendRole#bound_locations}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#bound_locations AzureAuthBackendRole#bound_locations}
---
@@ -185,7 +185,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The list of resource groups that login is restricted to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#bound_resource_groups AzureAuthBackendRole#bound_resource_groups}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#bound_resource_groups AzureAuthBackendRole#bound_resource_groups}
---
@@ -195,7 +195,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The list of scale set names that the login is restricted to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#bound_scale_sets AzureAuthBackendRole#bound_scale_sets}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#bound_scale_sets AzureAuthBackendRole#bound_scale_sets}
---
@@ -205,7 +205,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The list of Service Principal IDs that login is restricted to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#bound_service_principal_ids AzureAuthBackendRole#bound_service_principal_ids}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#bound_service_principal_ids AzureAuthBackendRole#bound_service_principal_ids}
---
@@ -215,7 +215,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The list of subscription IDs that login is restricted to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#bound_subscription_ids AzureAuthBackendRole#bound_subscription_ids}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#bound_subscription_ids AzureAuthBackendRole#bound_subscription_ids}
---
@@ -223,7 +223,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#id AzureAuthBackendRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#id AzureAuthBackendRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -236,7 +236,7 @@ If you experience problems setting this value it might not be settable. Please t
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#namespace AzureAuthBackendRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#namespace AzureAuthBackendRole#namespace}
---
@@ -246,7 +246,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Specifies the blocks of IP addresses which are allowed to use the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_bound_cidrs AzureAuthBackendRole#token_bound_cidrs}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_bound_cidrs AzureAuthBackendRole#token_bound_cidrs}
---
@@ -256,7 +256,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Generated Token's Explicit Maximum TTL in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_explicit_max_ttl AzureAuthBackendRole#token_explicit_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_explicit_max_ttl AzureAuthBackendRole#token_explicit_max_ttl}
---
@@ -266,7 +266,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The maximum lifetime of the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_max_ttl AzureAuthBackendRole#token_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_max_ttl AzureAuthBackendRole#token_max_ttl}
---
@@ -276,7 +276,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
If true, the 'default' policy will not automatically be added to generated tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_no_default_policy AzureAuthBackendRole#token_no_default_policy}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_no_default_policy AzureAuthBackendRole#token_no_default_policy}
---
@@ -286,7 +286,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The maximum number of times a token may be used, a value of zero means unlimited.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_num_uses AzureAuthBackendRole#token_num_uses}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_num_uses AzureAuthBackendRole#token_num_uses}
---
@@ -296,7 +296,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Generated Token's Period.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_period AzureAuthBackendRole#token_period}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_period AzureAuthBackendRole#token_period}
---
@@ -306,7 +306,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Generated Token's Policies.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_policies AzureAuthBackendRole#token_policies}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_policies AzureAuthBackendRole#token_policies}
---
@@ -316,7 +316,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The initial ttl of the token to generate in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_ttl AzureAuthBackendRole#token_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_ttl AzureAuthBackendRole#token_ttl}
---
@@ -326,7 +326,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The type of token to generate, service or batch.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_type AzureAuthBackendRole#token_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_type AzureAuthBackendRole#token_type}
---
@@ -879,7 +879,7 @@ The construct id used in the generated config for the AzureAuthBackendRole to im
The id of the existing AzureAuthBackendRole that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#import import section} in the documentation of this resource for the id to use
---
@@ -1553,7 +1553,7 @@ AzureAuthBackendRoleConfig.builder()
| boundScaleSets
| java.util.List
| The list of scale set names that the login is restricted to. |
| boundServicePrincipalIds
| java.util.List
| The list of Service Principal IDs that login is restricted to. |
| boundSubscriptionIds
| java.util.List
| The list of subscription IDs that login is restricted to. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#id AzureAuthBackendRole#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#id AzureAuthBackendRole#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
| tokenBoundCidrs
| java.util.List
| Specifies the blocks of IP addresses which are allowed to use the generated token. |
| tokenExplicitMaxTtl
| java.lang.Number
| Generated Token's Explicit Maximum TTL in seconds. |
@@ -1647,7 +1647,7 @@ public java.lang.String getRole();
Name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#role AzureAuthBackendRole#role}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#role AzureAuthBackendRole#role}
---
@@ -1661,7 +1661,7 @@ public java.lang.String getBackend();
Unique name of the auth backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#backend AzureAuthBackendRole#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#backend AzureAuthBackendRole#backend}
---
@@ -1675,7 +1675,7 @@ public java.util.List getBoundGroupIds();
The list of group ids that login is restricted to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#bound_group_ids AzureAuthBackendRole#bound_group_ids}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#bound_group_ids AzureAuthBackendRole#bound_group_ids}
---
@@ -1689,7 +1689,7 @@ public java.util.List getBoundLocations();
The list of locations that login is restricted to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#bound_locations AzureAuthBackendRole#bound_locations}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#bound_locations AzureAuthBackendRole#bound_locations}
---
@@ -1703,7 +1703,7 @@ public java.util.List getBoundResourceGroups();
The list of resource groups that login is restricted to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#bound_resource_groups AzureAuthBackendRole#bound_resource_groups}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#bound_resource_groups AzureAuthBackendRole#bound_resource_groups}
---
@@ -1717,7 +1717,7 @@ public java.util.List getBoundScaleSets();
The list of scale set names that the login is restricted to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#bound_scale_sets AzureAuthBackendRole#bound_scale_sets}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#bound_scale_sets AzureAuthBackendRole#bound_scale_sets}
---
@@ -1731,7 +1731,7 @@ public java.util.List getBoundServicePrincipalIds();
The list of Service Principal IDs that login is restricted to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#bound_service_principal_ids AzureAuthBackendRole#bound_service_principal_ids}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#bound_service_principal_ids AzureAuthBackendRole#bound_service_principal_ids}
---
@@ -1745,7 +1745,7 @@ public java.util.List getBoundSubscriptionIds();
The list of subscription IDs that login is restricted to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#bound_subscription_ids AzureAuthBackendRole#bound_subscription_ids}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#bound_subscription_ids AzureAuthBackendRole#bound_subscription_ids}
---
@@ -1757,7 +1757,7 @@ public java.lang.String getId();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#id AzureAuthBackendRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#id AzureAuthBackendRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1774,7 +1774,7 @@ public java.lang.String getNamespace();
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#namespace AzureAuthBackendRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#namespace AzureAuthBackendRole#namespace}
---
@@ -1788,7 +1788,7 @@ public java.util.List getTokenBoundCidrs();
Specifies the blocks of IP addresses which are allowed to use the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_bound_cidrs AzureAuthBackendRole#token_bound_cidrs}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_bound_cidrs AzureAuthBackendRole#token_bound_cidrs}
---
@@ -1802,7 +1802,7 @@ public java.lang.Number getTokenExplicitMaxTtl();
Generated Token's Explicit Maximum TTL in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_explicit_max_ttl AzureAuthBackendRole#token_explicit_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_explicit_max_ttl AzureAuthBackendRole#token_explicit_max_ttl}
---
@@ -1816,7 +1816,7 @@ public java.lang.Number getTokenMaxTtl();
The maximum lifetime of the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_max_ttl AzureAuthBackendRole#token_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_max_ttl AzureAuthBackendRole#token_max_ttl}
---
@@ -1830,7 +1830,7 @@ public java.lang.Object getTokenNoDefaultPolicy();
If true, the 'default' policy will not automatically be added to generated tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_no_default_policy AzureAuthBackendRole#token_no_default_policy}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_no_default_policy AzureAuthBackendRole#token_no_default_policy}
---
@@ -1844,7 +1844,7 @@ public java.lang.Number getTokenNumUses();
The maximum number of times a token may be used, a value of zero means unlimited.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_num_uses AzureAuthBackendRole#token_num_uses}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_num_uses AzureAuthBackendRole#token_num_uses}
---
@@ -1858,7 +1858,7 @@ public java.lang.Number getTokenPeriod();
Generated Token's Period.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_period AzureAuthBackendRole#token_period}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_period AzureAuthBackendRole#token_period}
---
@@ -1872,7 +1872,7 @@ public java.util.List getTokenPolicies();
Generated Token's Policies.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_policies AzureAuthBackendRole#token_policies}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_policies AzureAuthBackendRole#token_policies}
---
@@ -1886,7 +1886,7 @@ public java.lang.Number getTokenTtl();
The initial ttl of the token to generate in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_ttl AzureAuthBackendRole#token_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_ttl AzureAuthBackendRole#token_ttl}
---
@@ -1900,7 +1900,7 @@ public java.lang.String getTokenType();
The type of token to generate, service or batch.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_type AzureAuthBackendRole#token_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_type AzureAuthBackendRole#token_type}
---
diff --git a/docs/azureAuthBackendRole.python.md b/docs/azureAuthBackendRole.python.md
index f7ea66e6..d1e861ae 100644
--- a/docs/azureAuthBackendRole.python.md
+++ b/docs/azureAuthBackendRole.python.md
@@ -4,7 +4,7 @@
### AzureAuthBackendRole
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role vault_azure_auth_backend_role}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role vault_azure_auth_backend_role}.
#### Initializers
@@ -62,7 +62,7 @@ azureAuthBackendRole.AzureAuthBackendRole(
| bound_scale_sets
| typing.List[str]
| The list of scale set names that the login is restricted to. |
| bound_service_principal_ids
| typing.List[str]
| The list of Service Principal IDs that login is restricted to. |
| bound_subscription_ids
| typing.List[str]
| The list of subscription IDs that login is restricted to. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#id AzureAuthBackendRole#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#id AzureAuthBackendRole#id}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
| token_bound_cidrs
| typing.List[str]
| Specifies the blocks of IP addresses which are allowed to use the generated token. |
| token_explicit_max_ttl
| typing.Union[int, float]
| Generated Token's Explicit Maximum TTL in seconds. |
@@ -142,7 +142,7 @@ Must be unique amongst siblings in the same scope
Name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#role AzureAuthBackendRole#role}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#role AzureAuthBackendRole#role}
---
@@ -152,7 +152,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Unique name of the auth backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#backend AzureAuthBackendRole#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#backend AzureAuthBackendRole#backend}
---
@@ -162,7 +162,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The list of group ids that login is restricted to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#bound_group_ids AzureAuthBackendRole#bound_group_ids}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#bound_group_ids AzureAuthBackendRole#bound_group_ids}
---
@@ -172,7 +172,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The list of locations that login is restricted to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#bound_locations AzureAuthBackendRole#bound_locations}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#bound_locations AzureAuthBackendRole#bound_locations}
---
@@ -182,7 +182,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The list of resource groups that login is restricted to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#bound_resource_groups AzureAuthBackendRole#bound_resource_groups}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#bound_resource_groups AzureAuthBackendRole#bound_resource_groups}
---
@@ -192,7 +192,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The list of scale set names that the login is restricted to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#bound_scale_sets AzureAuthBackendRole#bound_scale_sets}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#bound_scale_sets AzureAuthBackendRole#bound_scale_sets}
---
@@ -202,7 +202,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The list of Service Principal IDs that login is restricted to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#bound_service_principal_ids AzureAuthBackendRole#bound_service_principal_ids}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#bound_service_principal_ids AzureAuthBackendRole#bound_service_principal_ids}
---
@@ -212,7 +212,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The list of subscription IDs that login is restricted to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#bound_subscription_ids AzureAuthBackendRole#bound_subscription_ids}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#bound_subscription_ids AzureAuthBackendRole#bound_subscription_ids}
---
@@ -220,7 +220,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#id AzureAuthBackendRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#id AzureAuthBackendRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -233,7 +233,7 @@ If you experience problems setting this value it might not be settable. Please t
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#namespace AzureAuthBackendRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#namespace AzureAuthBackendRole#namespace}
---
@@ -243,7 +243,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Specifies the blocks of IP addresses which are allowed to use the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_bound_cidrs AzureAuthBackendRole#token_bound_cidrs}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_bound_cidrs AzureAuthBackendRole#token_bound_cidrs}
---
@@ -253,7 +253,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Generated Token's Explicit Maximum TTL in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_explicit_max_ttl AzureAuthBackendRole#token_explicit_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_explicit_max_ttl AzureAuthBackendRole#token_explicit_max_ttl}
---
@@ -263,7 +263,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The maximum lifetime of the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_max_ttl AzureAuthBackendRole#token_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_max_ttl AzureAuthBackendRole#token_max_ttl}
---
@@ -273,7 +273,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
If true, the 'default' policy will not automatically be added to generated tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_no_default_policy AzureAuthBackendRole#token_no_default_policy}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_no_default_policy AzureAuthBackendRole#token_no_default_policy}
---
@@ -283,7 +283,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The maximum number of times a token may be used, a value of zero means unlimited.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_num_uses AzureAuthBackendRole#token_num_uses}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_num_uses AzureAuthBackendRole#token_num_uses}
---
@@ -293,7 +293,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Generated Token's Period.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_period AzureAuthBackendRole#token_period}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_period AzureAuthBackendRole#token_period}
---
@@ -303,7 +303,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Generated Token's Policies.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_policies AzureAuthBackendRole#token_policies}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_policies AzureAuthBackendRole#token_policies}
---
@@ -313,7 +313,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The initial ttl of the token to generate in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_ttl AzureAuthBackendRole#token_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_ttl AzureAuthBackendRole#token_ttl}
---
@@ -323,7 +323,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The type of token to generate, service or batch.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_type AzureAuthBackendRole#token_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_type AzureAuthBackendRole#token_type}
---
@@ -922,7 +922,7 @@ The construct id used in the generated config for the AzureAuthBackendRole to im
The id of the existing AzureAuthBackendRole that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#import import section} in the documentation of this resource for the id to use
---
@@ -1591,7 +1591,7 @@ azureAuthBackendRole.AzureAuthBackendRoleConfig(
| bound_scale_sets
| typing.List[str]
| The list of scale set names that the login is restricted to. |
| bound_service_principal_ids
| typing.List[str]
| The list of Service Principal IDs that login is restricted to. |
| bound_subscription_ids
| typing.List[str]
| The list of subscription IDs that login is restricted to. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#id AzureAuthBackendRole#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#id AzureAuthBackendRole#id}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
| token_bound_cidrs
| typing.List[str]
| Specifies the blocks of IP addresses which are allowed to use the generated token. |
| token_explicit_max_ttl
| typing.Union[int, float]
| Generated Token's Explicit Maximum TTL in seconds. |
@@ -1685,7 +1685,7 @@ role: str
Name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#role AzureAuthBackendRole#role}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#role AzureAuthBackendRole#role}
---
@@ -1699,7 +1699,7 @@ backend: str
Unique name of the auth backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#backend AzureAuthBackendRole#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#backend AzureAuthBackendRole#backend}
---
@@ -1713,7 +1713,7 @@ bound_group_ids: typing.List[str]
The list of group ids that login is restricted to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#bound_group_ids AzureAuthBackendRole#bound_group_ids}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#bound_group_ids AzureAuthBackendRole#bound_group_ids}
---
@@ -1727,7 +1727,7 @@ bound_locations: typing.List[str]
The list of locations that login is restricted to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#bound_locations AzureAuthBackendRole#bound_locations}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#bound_locations AzureAuthBackendRole#bound_locations}
---
@@ -1741,7 +1741,7 @@ bound_resource_groups: typing.List[str]
The list of resource groups that login is restricted to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#bound_resource_groups AzureAuthBackendRole#bound_resource_groups}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#bound_resource_groups AzureAuthBackendRole#bound_resource_groups}
---
@@ -1755,7 +1755,7 @@ bound_scale_sets: typing.List[str]
The list of scale set names that the login is restricted to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#bound_scale_sets AzureAuthBackendRole#bound_scale_sets}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#bound_scale_sets AzureAuthBackendRole#bound_scale_sets}
---
@@ -1769,7 +1769,7 @@ bound_service_principal_ids: typing.List[str]
The list of Service Principal IDs that login is restricted to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#bound_service_principal_ids AzureAuthBackendRole#bound_service_principal_ids}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#bound_service_principal_ids AzureAuthBackendRole#bound_service_principal_ids}
---
@@ -1783,7 +1783,7 @@ bound_subscription_ids: typing.List[str]
The list of subscription IDs that login is restricted to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#bound_subscription_ids AzureAuthBackendRole#bound_subscription_ids}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#bound_subscription_ids AzureAuthBackendRole#bound_subscription_ids}
---
@@ -1795,7 +1795,7 @@ id: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#id AzureAuthBackendRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#id AzureAuthBackendRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1812,7 +1812,7 @@ namespace: str
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#namespace AzureAuthBackendRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#namespace AzureAuthBackendRole#namespace}
---
@@ -1826,7 +1826,7 @@ token_bound_cidrs: typing.List[str]
Specifies the blocks of IP addresses which are allowed to use the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_bound_cidrs AzureAuthBackendRole#token_bound_cidrs}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_bound_cidrs AzureAuthBackendRole#token_bound_cidrs}
---
@@ -1840,7 +1840,7 @@ token_explicit_max_ttl: typing.Union[int, float]
Generated Token's Explicit Maximum TTL in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_explicit_max_ttl AzureAuthBackendRole#token_explicit_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_explicit_max_ttl AzureAuthBackendRole#token_explicit_max_ttl}
---
@@ -1854,7 +1854,7 @@ token_max_ttl: typing.Union[int, float]
The maximum lifetime of the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_max_ttl AzureAuthBackendRole#token_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_max_ttl AzureAuthBackendRole#token_max_ttl}
---
@@ -1868,7 +1868,7 @@ token_no_default_policy: typing.Union[bool, IResolvable]
If true, the 'default' policy will not automatically be added to generated tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_no_default_policy AzureAuthBackendRole#token_no_default_policy}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_no_default_policy AzureAuthBackendRole#token_no_default_policy}
---
@@ -1882,7 +1882,7 @@ token_num_uses: typing.Union[int, float]
The maximum number of times a token may be used, a value of zero means unlimited.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_num_uses AzureAuthBackendRole#token_num_uses}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_num_uses AzureAuthBackendRole#token_num_uses}
---
@@ -1896,7 +1896,7 @@ token_period: typing.Union[int, float]
Generated Token's Period.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_period AzureAuthBackendRole#token_period}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_period AzureAuthBackendRole#token_period}
---
@@ -1910,7 +1910,7 @@ token_policies: typing.List[str]
Generated Token's Policies.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_policies AzureAuthBackendRole#token_policies}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_policies AzureAuthBackendRole#token_policies}
---
@@ -1924,7 +1924,7 @@ token_ttl: typing.Union[int, float]
The initial ttl of the token to generate in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_ttl AzureAuthBackendRole#token_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_ttl AzureAuthBackendRole#token_ttl}
---
@@ -1938,7 +1938,7 @@ token_type: str
The type of token to generate, service or batch.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_type AzureAuthBackendRole#token_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_type AzureAuthBackendRole#token_type}
---
diff --git a/docs/azureAuthBackendRole.typescript.md b/docs/azureAuthBackendRole.typescript.md
index 583e97fe..0596293b 100644
--- a/docs/azureAuthBackendRole.typescript.md
+++ b/docs/azureAuthBackendRole.typescript.md
@@ -4,7 +4,7 @@
### AzureAuthBackendRole
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role vault_azure_auth_backend_role}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role vault_azure_auth_backend_role}.
#### Initializers
@@ -593,7 +593,7 @@ The construct id used in the generated config for the AzureAuthBackendRole to im
The id of the existing AzureAuthBackendRole that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#import import section} in the documentation of this resource for the id to use
---
@@ -1235,7 +1235,7 @@ const azureAuthBackendRoleConfig: azureAuthBackendRole.AzureAuthBackendRoleConfi
| boundScaleSets
| string[]
| The list of scale set names that the login is restricted to. |
| boundServicePrincipalIds
| string[]
| The list of Service Principal IDs that login is restricted to. |
| boundSubscriptionIds
| string[]
| The list of subscription IDs that login is restricted to. |
-| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#id AzureAuthBackendRole#id}. |
+| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#id AzureAuthBackendRole#id}. |
| namespace
| string
| Target namespace. (requires Enterprise). |
| tokenBoundCidrs
| string[]
| Specifies the blocks of IP addresses which are allowed to use the generated token. |
| tokenExplicitMaxTtl
| number
| Generated Token's Explicit Maximum TTL in seconds. |
@@ -1329,7 +1329,7 @@ public readonly role: string;
Name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#role AzureAuthBackendRole#role}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#role AzureAuthBackendRole#role}
---
@@ -1343,7 +1343,7 @@ public readonly backend: string;
Unique name of the auth backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#backend AzureAuthBackendRole#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#backend AzureAuthBackendRole#backend}
---
@@ -1357,7 +1357,7 @@ public readonly boundGroupIds: string[];
The list of group ids that login is restricted to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#bound_group_ids AzureAuthBackendRole#bound_group_ids}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#bound_group_ids AzureAuthBackendRole#bound_group_ids}
---
@@ -1371,7 +1371,7 @@ public readonly boundLocations: string[];
The list of locations that login is restricted to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#bound_locations AzureAuthBackendRole#bound_locations}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#bound_locations AzureAuthBackendRole#bound_locations}
---
@@ -1385,7 +1385,7 @@ public readonly boundResourceGroups: string[];
The list of resource groups that login is restricted to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#bound_resource_groups AzureAuthBackendRole#bound_resource_groups}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#bound_resource_groups AzureAuthBackendRole#bound_resource_groups}
---
@@ -1399,7 +1399,7 @@ public readonly boundScaleSets: string[];
The list of scale set names that the login is restricted to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#bound_scale_sets AzureAuthBackendRole#bound_scale_sets}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#bound_scale_sets AzureAuthBackendRole#bound_scale_sets}
---
@@ -1413,7 +1413,7 @@ public readonly boundServicePrincipalIds: string[];
The list of Service Principal IDs that login is restricted to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#bound_service_principal_ids AzureAuthBackendRole#bound_service_principal_ids}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#bound_service_principal_ids AzureAuthBackendRole#bound_service_principal_ids}
---
@@ -1427,7 +1427,7 @@ public readonly boundSubscriptionIds: string[];
The list of subscription IDs that login is restricted to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#bound_subscription_ids AzureAuthBackendRole#bound_subscription_ids}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#bound_subscription_ids AzureAuthBackendRole#bound_subscription_ids}
---
@@ -1439,7 +1439,7 @@ public readonly id: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#id AzureAuthBackendRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#id AzureAuthBackendRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1456,7 +1456,7 @@ public readonly namespace: string;
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#namespace AzureAuthBackendRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#namespace AzureAuthBackendRole#namespace}
---
@@ -1470,7 +1470,7 @@ public readonly tokenBoundCidrs: string[];
Specifies the blocks of IP addresses which are allowed to use the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_bound_cidrs AzureAuthBackendRole#token_bound_cidrs}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_bound_cidrs AzureAuthBackendRole#token_bound_cidrs}
---
@@ -1484,7 +1484,7 @@ public readonly tokenExplicitMaxTtl: number;
Generated Token's Explicit Maximum TTL in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_explicit_max_ttl AzureAuthBackendRole#token_explicit_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_explicit_max_ttl AzureAuthBackendRole#token_explicit_max_ttl}
---
@@ -1498,7 +1498,7 @@ public readonly tokenMaxTtl: number;
The maximum lifetime of the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_max_ttl AzureAuthBackendRole#token_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_max_ttl AzureAuthBackendRole#token_max_ttl}
---
@@ -1512,7 +1512,7 @@ public readonly tokenNoDefaultPolicy: boolean | IResolvable;
If true, the 'default' policy will not automatically be added to generated tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_no_default_policy AzureAuthBackendRole#token_no_default_policy}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_no_default_policy AzureAuthBackendRole#token_no_default_policy}
---
@@ -1526,7 +1526,7 @@ public readonly tokenNumUses: number;
The maximum number of times a token may be used, a value of zero means unlimited.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_num_uses AzureAuthBackendRole#token_num_uses}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_num_uses AzureAuthBackendRole#token_num_uses}
---
@@ -1540,7 +1540,7 @@ public readonly tokenPeriod: number;
Generated Token's Period.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_period AzureAuthBackendRole#token_period}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_period AzureAuthBackendRole#token_period}
---
@@ -1554,7 +1554,7 @@ public readonly tokenPolicies: string[];
Generated Token's Policies.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_policies AzureAuthBackendRole#token_policies}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_policies AzureAuthBackendRole#token_policies}
---
@@ -1568,7 +1568,7 @@ public readonly tokenTtl: number;
The initial ttl of the token to generate in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_ttl AzureAuthBackendRole#token_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_ttl AzureAuthBackendRole#token_ttl}
---
@@ -1582,7 +1582,7 @@ public readonly tokenType: string;
The type of token to generate, service or batch.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_type AzureAuthBackendRole#token_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_type AzureAuthBackendRole#token_type}
---
diff --git a/docs/azureSecretBackend.csharp.md b/docs/azureSecretBackend.csharp.md
index 8a8cae75..2bf1d541 100644
--- a/docs/azureSecretBackend.csharp.md
+++ b/docs/azureSecretBackend.csharp.md
@@ -4,7 +4,7 @@
### AzureSecretBackend
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend vault_azure_secret_backend}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend vault_azure_secret_backend}.
#### Initializers
@@ -551,7 +551,7 @@ The construct id used in the generated config for the AzureSecretBackend to impo
The id of the existing AzureSecretBackend that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#import import section} in the documentation of this resource for the id to use
---
@@ -1104,7 +1104,7 @@ new AzureSecretBackendConfig {
| Description
| string
| Human-friendly description of the mount for the backend. |
| DisableRemount
| object
| If set, opts out of mount migration on path updates. |
| Environment
| string
| The Azure cloud environment. Valid values: AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud, AzureGermanCloud. |
-| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#id AzureSecretBackend#id}. |
+| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#id AzureSecretBackend#id}. |
| IdentityTokenAudience
| string
| The audience claim value. |
| IdentityTokenKey
| string
| The key to use for signing identity tokens. |
| IdentityTokenTtl
| double
| The TTL of generated identity tokens in seconds. |
@@ -1194,7 +1194,7 @@ public string SubscriptionId { get; set; }
The subscription id for the Azure Active Directory.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#subscription_id AzureSecretBackend#subscription_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#subscription_id AzureSecretBackend#subscription_id}
---
@@ -1208,7 +1208,7 @@ public string TenantId { get; set; }
The tenant id for the Azure Active Directory organization.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#tenant_id AzureSecretBackend#tenant_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#tenant_id AzureSecretBackend#tenant_id}
---
@@ -1222,7 +1222,7 @@ public string ClientId { get; set; }
The client id for credentials to query the Azure APIs. Currently read permissions to query compute resources are required.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#client_id AzureSecretBackend#client_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#client_id AzureSecretBackend#client_id}
---
@@ -1236,7 +1236,7 @@ public string ClientSecret { get; set; }
The client secret for credentials to query the Azure APIs.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#client_secret AzureSecretBackend#client_secret}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#client_secret AzureSecretBackend#client_secret}
---
@@ -1250,7 +1250,7 @@ public string Description { get; set; }
Human-friendly description of the mount for the backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#description AzureSecretBackend#description}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#description AzureSecretBackend#description}
---
@@ -1264,7 +1264,7 @@ public object DisableRemount { get; set; }
If set, opts out of mount migration on path updates.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#disable_remount AzureSecretBackend#disable_remount}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#disable_remount AzureSecretBackend#disable_remount}
---
@@ -1278,7 +1278,7 @@ public string Environment { get; set; }
The Azure cloud environment. Valid values: AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud, AzureGermanCloud.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#environment AzureSecretBackend#environment}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#environment AzureSecretBackend#environment}
---
@@ -1290,7 +1290,7 @@ public string Id { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#id AzureSecretBackend#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#id AzureSecretBackend#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1307,7 +1307,7 @@ public string IdentityTokenAudience { get; set; }
The audience claim value.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#identity_token_audience AzureSecretBackend#identity_token_audience}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#identity_token_audience AzureSecretBackend#identity_token_audience}
---
@@ -1321,7 +1321,7 @@ public string IdentityTokenKey { get; set; }
The key to use for signing identity tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#identity_token_key AzureSecretBackend#identity_token_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#identity_token_key AzureSecretBackend#identity_token_key}
---
@@ -1335,7 +1335,7 @@ public double IdentityTokenTtl { get; set; }
The TTL of generated identity tokens in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#identity_token_ttl AzureSecretBackend#identity_token_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#identity_token_ttl AzureSecretBackend#identity_token_ttl}
---
@@ -1349,7 +1349,7 @@ public string Namespace { get; set; }
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#namespace AzureSecretBackend#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#namespace AzureSecretBackend#namespace}
---
@@ -1363,7 +1363,7 @@ public string Path { get; set; }
Path to mount the backend at.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#path AzureSecretBackend#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#path AzureSecretBackend#path}
---
@@ -1377,7 +1377,7 @@ public object UseMicrosoftGraphApi { get; set; }
Use the Microsoft Graph API. Should be set to true on vault-1.10+.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#use_microsoft_graph_api AzureSecretBackend#use_microsoft_graph_api}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#use_microsoft_graph_api AzureSecretBackend#use_microsoft_graph_api}
---
diff --git a/docs/azureSecretBackend.go.md b/docs/azureSecretBackend.go.md
index bafd023f..18f35948 100644
--- a/docs/azureSecretBackend.go.md
+++ b/docs/azureSecretBackend.go.md
@@ -4,7 +4,7 @@
### AzureSecretBackend
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend vault_azure_secret_backend}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend vault_azure_secret_backend}.
#### Initializers
@@ -551,7 +551,7 @@ The construct id used in the generated config for the AzureSecretBackend to impo
The id of the existing AzureSecretBackend that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#import import section} in the documentation of this resource for the id to use
---
@@ -1104,7 +1104,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/azuresecretbackend"
| Description
| *string
| Human-friendly description of the mount for the backend. |
| DisableRemount
| interface{}
| If set, opts out of mount migration on path updates. |
| Environment
| *string
| The Azure cloud environment. Valid values: AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud, AzureGermanCloud. |
-| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#id AzureSecretBackend#id}. |
+| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#id AzureSecretBackend#id}. |
| IdentityTokenAudience
| *string
| The audience claim value. |
| IdentityTokenKey
| *string
| The key to use for signing identity tokens. |
| IdentityTokenTtl
| *f64
| The TTL of generated identity tokens in seconds. |
@@ -1194,7 +1194,7 @@ SubscriptionId *string
The subscription id for the Azure Active Directory.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#subscription_id AzureSecretBackend#subscription_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#subscription_id AzureSecretBackend#subscription_id}
---
@@ -1208,7 +1208,7 @@ TenantId *string
The tenant id for the Azure Active Directory organization.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#tenant_id AzureSecretBackend#tenant_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#tenant_id AzureSecretBackend#tenant_id}
---
@@ -1222,7 +1222,7 @@ ClientId *string
The client id for credentials to query the Azure APIs. Currently read permissions to query compute resources are required.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#client_id AzureSecretBackend#client_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#client_id AzureSecretBackend#client_id}
---
@@ -1236,7 +1236,7 @@ ClientSecret *string
The client secret for credentials to query the Azure APIs.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#client_secret AzureSecretBackend#client_secret}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#client_secret AzureSecretBackend#client_secret}
---
@@ -1250,7 +1250,7 @@ Description *string
Human-friendly description of the mount for the backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#description AzureSecretBackend#description}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#description AzureSecretBackend#description}
---
@@ -1264,7 +1264,7 @@ DisableRemount interface{}
If set, opts out of mount migration on path updates.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#disable_remount AzureSecretBackend#disable_remount}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#disable_remount AzureSecretBackend#disable_remount}
---
@@ -1278,7 +1278,7 @@ Environment *string
The Azure cloud environment. Valid values: AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud, AzureGermanCloud.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#environment AzureSecretBackend#environment}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#environment AzureSecretBackend#environment}
---
@@ -1290,7 +1290,7 @@ Id *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#id AzureSecretBackend#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#id AzureSecretBackend#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1307,7 +1307,7 @@ IdentityTokenAudience *string
The audience claim value.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#identity_token_audience AzureSecretBackend#identity_token_audience}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#identity_token_audience AzureSecretBackend#identity_token_audience}
---
@@ -1321,7 +1321,7 @@ IdentityTokenKey *string
The key to use for signing identity tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#identity_token_key AzureSecretBackend#identity_token_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#identity_token_key AzureSecretBackend#identity_token_key}
---
@@ -1335,7 +1335,7 @@ IdentityTokenTtl *f64
The TTL of generated identity tokens in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#identity_token_ttl AzureSecretBackend#identity_token_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#identity_token_ttl AzureSecretBackend#identity_token_ttl}
---
@@ -1349,7 +1349,7 @@ Namespace *string
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#namespace AzureSecretBackend#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#namespace AzureSecretBackend#namespace}
---
@@ -1363,7 +1363,7 @@ Path *string
Path to mount the backend at.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#path AzureSecretBackend#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#path AzureSecretBackend#path}
---
@@ -1377,7 +1377,7 @@ UseMicrosoftGraphApi interface{}
Use the Microsoft Graph API. Should be set to true on vault-1.10+.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#use_microsoft_graph_api AzureSecretBackend#use_microsoft_graph_api}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#use_microsoft_graph_api AzureSecretBackend#use_microsoft_graph_api}
---
diff --git a/docs/azureSecretBackend.java.md b/docs/azureSecretBackend.java.md
index c44e4114..6749047d 100644
--- a/docs/azureSecretBackend.java.md
+++ b/docs/azureSecretBackend.java.md
@@ -4,7 +4,7 @@
### AzureSecretBackend
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend vault_azure_secret_backend}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend vault_azure_secret_backend}.
#### Initializers
@@ -60,7 +60,7 @@ AzureSecretBackend.Builder.create(Construct scope, java.lang.String id)
| description
| java.lang.String
| Human-friendly description of the mount for the backend. |
| disableRemount
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| If set, opts out of mount migration on path updates. |
| environment
| java.lang.String
| The Azure cloud environment. Valid values: AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud, AzureGermanCloud. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#id AzureSecretBackend#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#id AzureSecretBackend#id}. |
| identityTokenAudience
| java.lang.String
| The audience claim value. |
| identityTokenKey
| java.lang.String
| The key to use for signing identity tokens. |
| identityTokenTtl
| java.lang.Number
| The TTL of generated identity tokens in seconds. |
@@ -136,7 +136,7 @@ Must be unique amongst siblings in the same scope
The subscription id for the Azure Active Directory.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#subscription_id AzureSecretBackend#subscription_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#subscription_id AzureSecretBackend#subscription_id}
---
@@ -146,7 +146,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The tenant id for the Azure Active Directory organization.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#tenant_id AzureSecretBackend#tenant_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#tenant_id AzureSecretBackend#tenant_id}
---
@@ -156,7 +156,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The client id for credentials to query the Azure APIs. Currently read permissions to query compute resources are required.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#client_id AzureSecretBackend#client_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#client_id AzureSecretBackend#client_id}
---
@@ -166,7 +166,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The client secret for credentials to query the Azure APIs.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#client_secret AzureSecretBackend#client_secret}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#client_secret AzureSecretBackend#client_secret}
---
@@ -176,7 +176,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Human-friendly description of the mount for the backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#description AzureSecretBackend#description}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#description AzureSecretBackend#description}
---
@@ -186,7 +186,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
If set, opts out of mount migration on path updates.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#disable_remount AzureSecretBackend#disable_remount}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#disable_remount AzureSecretBackend#disable_remount}
---
@@ -196,7 +196,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The Azure cloud environment. Valid values: AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud, AzureGermanCloud.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#environment AzureSecretBackend#environment}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#environment AzureSecretBackend#environment}
---
@@ -204,7 +204,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#id AzureSecretBackend#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#id AzureSecretBackend#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -217,7 +217,7 @@ If you experience problems setting this value it might not be settable. Please t
The audience claim value.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#identity_token_audience AzureSecretBackend#identity_token_audience}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#identity_token_audience AzureSecretBackend#identity_token_audience}
---
@@ -227,7 +227,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The key to use for signing identity tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#identity_token_key AzureSecretBackend#identity_token_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#identity_token_key AzureSecretBackend#identity_token_key}
---
@@ -237,7 +237,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The TTL of generated identity tokens in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#identity_token_ttl AzureSecretBackend#identity_token_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#identity_token_ttl AzureSecretBackend#identity_token_ttl}
---
@@ -247,7 +247,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#namespace AzureSecretBackend#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#namespace AzureSecretBackend#namespace}
---
@@ -257,7 +257,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Path to mount the backend at.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#path AzureSecretBackend#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#path AzureSecretBackend#path}
---
@@ -267,7 +267,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Use the Microsoft Graph API. Should be set to true on vault-1.10+.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#use_microsoft_graph_api AzureSecretBackend#use_microsoft_graph_api}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#use_microsoft_graph_api AzureSecretBackend#use_microsoft_graph_api}
---
@@ -778,7 +778,7 @@ The construct id used in the generated config for the AzureSecretBackend to impo
The id of the existing AzureSecretBackend that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#import import section} in the documentation of this resource for the id to use
---
@@ -1337,7 +1337,7 @@ AzureSecretBackendConfig.builder()
| description
| java.lang.String
| Human-friendly description of the mount for the backend. |
| disableRemount
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| If set, opts out of mount migration on path updates. |
| environment
| java.lang.String
| The Azure cloud environment. Valid values: AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud, AzureGermanCloud. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#id AzureSecretBackend#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#id AzureSecretBackend#id}. |
| identityTokenAudience
| java.lang.String
| The audience claim value. |
| identityTokenKey
| java.lang.String
| The key to use for signing identity tokens. |
| identityTokenTtl
| java.lang.Number
| The TTL of generated identity tokens in seconds. |
@@ -1427,7 +1427,7 @@ public java.lang.String getSubscriptionId();
The subscription id for the Azure Active Directory.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#subscription_id AzureSecretBackend#subscription_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#subscription_id AzureSecretBackend#subscription_id}
---
@@ -1441,7 +1441,7 @@ public java.lang.String getTenantId();
The tenant id for the Azure Active Directory organization.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#tenant_id AzureSecretBackend#tenant_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#tenant_id AzureSecretBackend#tenant_id}
---
@@ -1455,7 +1455,7 @@ public java.lang.String getClientId();
The client id for credentials to query the Azure APIs. Currently read permissions to query compute resources are required.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#client_id AzureSecretBackend#client_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#client_id AzureSecretBackend#client_id}
---
@@ -1469,7 +1469,7 @@ public java.lang.String getClientSecret();
The client secret for credentials to query the Azure APIs.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#client_secret AzureSecretBackend#client_secret}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#client_secret AzureSecretBackend#client_secret}
---
@@ -1483,7 +1483,7 @@ public java.lang.String getDescription();
Human-friendly description of the mount for the backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#description AzureSecretBackend#description}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#description AzureSecretBackend#description}
---
@@ -1497,7 +1497,7 @@ public java.lang.Object getDisableRemount();
If set, opts out of mount migration on path updates.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#disable_remount AzureSecretBackend#disable_remount}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#disable_remount AzureSecretBackend#disable_remount}
---
@@ -1511,7 +1511,7 @@ public java.lang.String getEnvironment();
The Azure cloud environment. Valid values: AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud, AzureGermanCloud.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#environment AzureSecretBackend#environment}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#environment AzureSecretBackend#environment}
---
@@ -1523,7 +1523,7 @@ public java.lang.String getId();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#id AzureSecretBackend#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#id AzureSecretBackend#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1540,7 +1540,7 @@ public java.lang.String getIdentityTokenAudience();
The audience claim value.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#identity_token_audience AzureSecretBackend#identity_token_audience}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#identity_token_audience AzureSecretBackend#identity_token_audience}
---
@@ -1554,7 +1554,7 @@ public java.lang.String getIdentityTokenKey();
The key to use for signing identity tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#identity_token_key AzureSecretBackend#identity_token_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#identity_token_key AzureSecretBackend#identity_token_key}
---
@@ -1568,7 +1568,7 @@ public java.lang.Number getIdentityTokenTtl();
The TTL of generated identity tokens in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#identity_token_ttl AzureSecretBackend#identity_token_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#identity_token_ttl AzureSecretBackend#identity_token_ttl}
---
@@ -1582,7 +1582,7 @@ public java.lang.String getNamespace();
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#namespace AzureSecretBackend#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#namespace AzureSecretBackend#namespace}
---
@@ -1596,7 +1596,7 @@ public java.lang.String getPath();
Path to mount the backend at.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#path AzureSecretBackend#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#path AzureSecretBackend#path}
---
@@ -1610,7 +1610,7 @@ public java.lang.Object getUseMicrosoftGraphApi();
Use the Microsoft Graph API. Should be set to true on vault-1.10+.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#use_microsoft_graph_api AzureSecretBackend#use_microsoft_graph_api}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#use_microsoft_graph_api AzureSecretBackend#use_microsoft_graph_api}
---
diff --git a/docs/azureSecretBackend.python.md b/docs/azureSecretBackend.python.md
index dce1fd49..d0700123 100644
--- a/docs/azureSecretBackend.python.md
+++ b/docs/azureSecretBackend.python.md
@@ -4,7 +4,7 @@
### AzureSecretBackend
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend vault_azure_secret_backend}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend vault_azure_secret_backend}.
#### Initializers
@@ -56,7 +56,7 @@ azureSecretBackend.AzureSecretBackend(
| description
| str
| Human-friendly description of the mount for the backend. |
| disable_remount
| typing.Union[bool, cdktf.IResolvable]
| If set, opts out of mount migration on path updates. |
| environment
| str
| The Azure cloud environment. Valid values: AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud, AzureGermanCloud. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#id AzureSecretBackend#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#id AzureSecretBackend#id}. |
| identity_token_audience
| str
| The audience claim value. |
| identity_token_key
| str
| The key to use for signing identity tokens. |
| identity_token_ttl
| typing.Union[int, float]
| The TTL of generated identity tokens in seconds. |
@@ -132,7 +132,7 @@ Must be unique amongst siblings in the same scope
The subscription id for the Azure Active Directory.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#subscription_id AzureSecretBackend#subscription_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#subscription_id AzureSecretBackend#subscription_id}
---
@@ -142,7 +142,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The tenant id for the Azure Active Directory organization.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#tenant_id AzureSecretBackend#tenant_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#tenant_id AzureSecretBackend#tenant_id}
---
@@ -152,7 +152,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The client id for credentials to query the Azure APIs. Currently read permissions to query compute resources are required.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#client_id AzureSecretBackend#client_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#client_id AzureSecretBackend#client_id}
---
@@ -162,7 +162,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The client secret for credentials to query the Azure APIs.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#client_secret AzureSecretBackend#client_secret}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#client_secret AzureSecretBackend#client_secret}
---
@@ -172,7 +172,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Human-friendly description of the mount for the backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#description AzureSecretBackend#description}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#description AzureSecretBackend#description}
---
@@ -182,7 +182,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
If set, opts out of mount migration on path updates.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#disable_remount AzureSecretBackend#disable_remount}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#disable_remount AzureSecretBackend#disable_remount}
---
@@ -192,7 +192,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The Azure cloud environment. Valid values: AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud, AzureGermanCloud.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#environment AzureSecretBackend#environment}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#environment AzureSecretBackend#environment}
---
@@ -200,7 +200,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#id AzureSecretBackend#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#id AzureSecretBackend#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -213,7 +213,7 @@ If you experience problems setting this value it might not be settable. Please t
The audience claim value.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#identity_token_audience AzureSecretBackend#identity_token_audience}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#identity_token_audience AzureSecretBackend#identity_token_audience}
---
@@ -223,7 +223,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The key to use for signing identity tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#identity_token_key AzureSecretBackend#identity_token_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#identity_token_key AzureSecretBackend#identity_token_key}
---
@@ -233,7 +233,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The TTL of generated identity tokens in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#identity_token_ttl AzureSecretBackend#identity_token_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#identity_token_ttl AzureSecretBackend#identity_token_ttl}
---
@@ -243,7 +243,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#namespace AzureSecretBackend#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#namespace AzureSecretBackend#namespace}
---
@@ -253,7 +253,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Path to mount the backend at.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#path AzureSecretBackend#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#path AzureSecretBackend#path}
---
@@ -263,7 +263,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Use the Microsoft Graph API. Should be set to true on vault-1.10+.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#use_microsoft_graph_api AzureSecretBackend#use_microsoft_graph_api}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#use_microsoft_graph_api AzureSecretBackend#use_microsoft_graph_api}
---
@@ -820,7 +820,7 @@ The construct id used in the generated config for the AzureSecretBackend to impo
The id of the existing AzureSecretBackend that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#import import section} in the documentation of this resource for the id to use
---
@@ -1373,7 +1373,7 @@ azureSecretBackend.AzureSecretBackendConfig(
| description
| str
| Human-friendly description of the mount for the backend. |
| disable_remount
| typing.Union[bool, cdktf.IResolvable]
| If set, opts out of mount migration on path updates. |
| environment
| str
| The Azure cloud environment. Valid values: AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud, AzureGermanCloud. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#id AzureSecretBackend#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#id AzureSecretBackend#id}. |
| identity_token_audience
| str
| The audience claim value. |
| identity_token_key
| str
| The key to use for signing identity tokens. |
| identity_token_ttl
| typing.Union[int, float]
| The TTL of generated identity tokens in seconds. |
@@ -1463,7 +1463,7 @@ subscription_id: str
The subscription id for the Azure Active Directory.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#subscription_id AzureSecretBackend#subscription_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#subscription_id AzureSecretBackend#subscription_id}
---
@@ -1477,7 +1477,7 @@ tenant_id: str
The tenant id for the Azure Active Directory organization.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#tenant_id AzureSecretBackend#tenant_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#tenant_id AzureSecretBackend#tenant_id}
---
@@ -1491,7 +1491,7 @@ client_id: str
The client id for credentials to query the Azure APIs. Currently read permissions to query compute resources are required.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#client_id AzureSecretBackend#client_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#client_id AzureSecretBackend#client_id}
---
@@ -1505,7 +1505,7 @@ client_secret: str
The client secret for credentials to query the Azure APIs.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#client_secret AzureSecretBackend#client_secret}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#client_secret AzureSecretBackend#client_secret}
---
@@ -1519,7 +1519,7 @@ description: str
Human-friendly description of the mount for the backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#description AzureSecretBackend#description}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#description AzureSecretBackend#description}
---
@@ -1533,7 +1533,7 @@ disable_remount: typing.Union[bool, IResolvable]
If set, opts out of mount migration on path updates.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#disable_remount AzureSecretBackend#disable_remount}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#disable_remount AzureSecretBackend#disable_remount}
---
@@ -1547,7 +1547,7 @@ environment: str
The Azure cloud environment. Valid values: AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud, AzureGermanCloud.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#environment AzureSecretBackend#environment}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#environment AzureSecretBackend#environment}
---
@@ -1559,7 +1559,7 @@ id: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#id AzureSecretBackend#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#id AzureSecretBackend#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1576,7 +1576,7 @@ identity_token_audience: str
The audience claim value.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#identity_token_audience AzureSecretBackend#identity_token_audience}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#identity_token_audience AzureSecretBackend#identity_token_audience}
---
@@ -1590,7 +1590,7 @@ identity_token_key: str
The key to use for signing identity tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#identity_token_key AzureSecretBackend#identity_token_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#identity_token_key AzureSecretBackend#identity_token_key}
---
@@ -1604,7 +1604,7 @@ identity_token_ttl: typing.Union[int, float]
The TTL of generated identity tokens in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#identity_token_ttl AzureSecretBackend#identity_token_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#identity_token_ttl AzureSecretBackend#identity_token_ttl}
---
@@ -1618,7 +1618,7 @@ namespace: str
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#namespace AzureSecretBackend#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#namespace AzureSecretBackend#namespace}
---
@@ -1632,7 +1632,7 @@ path: str
Path to mount the backend at.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#path AzureSecretBackend#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#path AzureSecretBackend#path}
---
@@ -1646,7 +1646,7 @@ use_microsoft_graph_api: typing.Union[bool, IResolvable]
Use the Microsoft Graph API. Should be set to true on vault-1.10+.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#use_microsoft_graph_api AzureSecretBackend#use_microsoft_graph_api}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#use_microsoft_graph_api AzureSecretBackend#use_microsoft_graph_api}
---
diff --git a/docs/azureSecretBackend.typescript.md b/docs/azureSecretBackend.typescript.md
index 17865e08..011387bf 100644
--- a/docs/azureSecretBackend.typescript.md
+++ b/docs/azureSecretBackend.typescript.md
@@ -4,7 +4,7 @@
### AzureSecretBackend
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend vault_azure_secret_backend}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend vault_azure_secret_backend}.
#### Initializers
@@ -551,7 +551,7 @@ The construct id used in the generated config for the AzureSecretBackend to impo
The id of the existing AzureSecretBackend that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#import import section} in the documentation of this resource for the id to use
---
@@ -1082,7 +1082,7 @@ const azureSecretBackendConfig: azureSecretBackend.AzureSecretBackendConfig = {
| description
| string
| Human-friendly description of the mount for the backend. |
| disableRemount
| boolean \| cdktf.IResolvable
| If set, opts out of mount migration on path updates. |
| environment
| string
| The Azure cloud environment. Valid values: AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud, AzureGermanCloud. |
-| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#id AzureSecretBackend#id}. |
+| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#id AzureSecretBackend#id}. |
| identityTokenAudience
| string
| The audience claim value. |
| identityTokenKey
| string
| The key to use for signing identity tokens. |
| identityTokenTtl
| number
| The TTL of generated identity tokens in seconds. |
@@ -1172,7 +1172,7 @@ public readonly subscriptionId: string;
The subscription id for the Azure Active Directory.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#subscription_id AzureSecretBackend#subscription_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#subscription_id AzureSecretBackend#subscription_id}
---
@@ -1186,7 +1186,7 @@ public readonly tenantId: string;
The tenant id for the Azure Active Directory organization.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#tenant_id AzureSecretBackend#tenant_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#tenant_id AzureSecretBackend#tenant_id}
---
@@ -1200,7 +1200,7 @@ public readonly clientId: string;
The client id for credentials to query the Azure APIs. Currently read permissions to query compute resources are required.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#client_id AzureSecretBackend#client_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#client_id AzureSecretBackend#client_id}
---
@@ -1214,7 +1214,7 @@ public readonly clientSecret: string;
The client secret for credentials to query the Azure APIs.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#client_secret AzureSecretBackend#client_secret}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#client_secret AzureSecretBackend#client_secret}
---
@@ -1228,7 +1228,7 @@ public readonly description: string;
Human-friendly description of the mount for the backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#description AzureSecretBackend#description}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#description AzureSecretBackend#description}
---
@@ -1242,7 +1242,7 @@ public readonly disableRemount: boolean | IResolvable;
If set, opts out of mount migration on path updates.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#disable_remount AzureSecretBackend#disable_remount}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#disable_remount AzureSecretBackend#disable_remount}
---
@@ -1256,7 +1256,7 @@ public readonly environment: string;
The Azure cloud environment. Valid values: AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud, AzureGermanCloud.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#environment AzureSecretBackend#environment}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#environment AzureSecretBackend#environment}
---
@@ -1268,7 +1268,7 @@ public readonly id: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#id AzureSecretBackend#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#id AzureSecretBackend#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1285,7 +1285,7 @@ public readonly identityTokenAudience: string;
The audience claim value.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#identity_token_audience AzureSecretBackend#identity_token_audience}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#identity_token_audience AzureSecretBackend#identity_token_audience}
---
@@ -1299,7 +1299,7 @@ public readonly identityTokenKey: string;
The key to use for signing identity tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#identity_token_key AzureSecretBackend#identity_token_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#identity_token_key AzureSecretBackend#identity_token_key}
---
@@ -1313,7 +1313,7 @@ public readonly identityTokenTtl: number;
The TTL of generated identity tokens in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#identity_token_ttl AzureSecretBackend#identity_token_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#identity_token_ttl AzureSecretBackend#identity_token_ttl}
---
@@ -1327,7 +1327,7 @@ public readonly namespace: string;
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#namespace AzureSecretBackend#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#namespace AzureSecretBackend#namespace}
---
@@ -1341,7 +1341,7 @@ public readonly path: string;
Path to mount the backend at.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#path AzureSecretBackend#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#path AzureSecretBackend#path}
---
@@ -1355,7 +1355,7 @@ public readonly useMicrosoftGraphApi: boolean | IResolvable;
Use the Microsoft Graph API. Should be set to true on vault-1.10+.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#use_microsoft_graph_api AzureSecretBackend#use_microsoft_graph_api}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#use_microsoft_graph_api AzureSecretBackend#use_microsoft_graph_api}
---
diff --git a/docs/azureSecretBackendRole.csharp.md b/docs/azureSecretBackendRole.csharp.md
index 363a77f5..cab9ae54 100644
--- a/docs/azureSecretBackendRole.csharp.md
+++ b/docs/azureSecretBackendRole.csharp.md
@@ -4,7 +4,7 @@
### AzureSecretBackendRole
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role vault_azure_secret_backend_role}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role vault_azure_secret_backend_role}.
#### Initializers
@@ -577,7 +577,7 @@ The construct id used in the generated config for the AzureSecretBackendRole to
The id of the existing AzureSecretBackendRole that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#import import section} in the documentation of this resource for the id to use
---
@@ -1074,7 +1074,7 @@ new AzureSecretBackendRoleAzureGroups {
| **Name** | **Type** | **Description** |
| --- | --- | --- |
-| GroupName
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#group_name AzureSecretBackendRole#group_name}. |
+| GroupName
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#group_name AzureSecretBackendRole#group_name}. |
---
@@ -1086,7 +1086,7 @@ public string GroupName { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#group_name AzureSecretBackendRole#group_name}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#group_name AzureSecretBackendRole#group_name}.
---
@@ -1108,9 +1108,9 @@ new AzureSecretBackendRoleAzureRoles {
| **Name** | **Type** | **Description** |
| --- | --- | --- |
-| Scope
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#scope AzureSecretBackendRole#scope}. |
-| RoleId
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#role_id AzureSecretBackendRole#role_id}. |
-| RoleName
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#role_name AzureSecretBackendRole#role_name}. |
+| Scope
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#scope AzureSecretBackendRole#scope}. |
+| RoleId
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#role_id AzureSecretBackendRole#role_id}. |
+| RoleName
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#role_name AzureSecretBackendRole#role_name}. |
---
@@ -1122,7 +1122,7 @@ public string Scope { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#scope AzureSecretBackendRole#scope}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#scope AzureSecretBackendRole#scope}.
---
@@ -1134,7 +1134,7 @@ public string RoleId { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#role_id AzureSecretBackendRole#role_id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#role_id AzureSecretBackendRole#role_id}.
---
@@ -1146,7 +1146,7 @@ public string RoleName { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#role_name AzureSecretBackendRole#role_name}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#role_name AzureSecretBackendRole#role_name}.
---
@@ -1198,7 +1198,7 @@ new AzureSecretBackendRoleConfig {
| AzureRoles
| object
| azure_roles block. |
| Backend
| string
| Unique name of the auth backend to configure. |
| Description
| string
| Human-friendly description of the mount for the backend. |
-| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#id AzureSecretBackendRole#id}. |
+| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#id AzureSecretBackendRole#id}. |
| MaxTtl
| string
| Human-friendly description of the mount for the backend. |
| Namespace
| string
| Target namespace. (requires Enterprise). |
| PermanentlyDelete
| object
| Indicates whether the applications and service principals created by Vault will be permanently deleted when the corresponding leases expire. |
@@ -1288,7 +1288,7 @@ public string Role { get; set; }
Name of the role to create.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#role AzureSecretBackendRole#role}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#role AzureSecretBackendRole#role}
---
@@ -1302,7 +1302,7 @@ public string ApplicationObjectId { get; set; }
Application Object ID for an existing service principal that will be used instead of creating dynamic service principals.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#application_object_id AzureSecretBackendRole#application_object_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#application_object_id AzureSecretBackendRole#application_object_id}
---
@@ -1316,7 +1316,7 @@ public object AzureGroups { get; set; }
azure_groups block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#azure_groups AzureSecretBackendRole#azure_groups}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#azure_groups AzureSecretBackendRole#azure_groups}
---
@@ -1330,7 +1330,7 @@ public object AzureRoles { get; set; }
azure_roles block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#azure_roles AzureSecretBackendRole#azure_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#azure_roles AzureSecretBackendRole#azure_roles}
---
@@ -1344,7 +1344,7 @@ public string Backend { get; set; }
Unique name of the auth backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#backend AzureSecretBackendRole#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#backend AzureSecretBackendRole#backend}
---
@@ -1358,7 +1358,7 @@ public string Description { get; set; }
Human-friendly description of the mount for the backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#description AzureSecretBackendRole#description}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#description AzureSecretBackendRole#description}
---
@@ -1370,7 +1370,7 @@ public string Id { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#id AzureSecretBackendRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#id AzureSecretBackendRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1387,7 +1387,7 @@ public string MaxTtl { get; set; }
Human-friendly description of the mount for the backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#max_ttl AzureSecretBackendRole#max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#max_ttl AzureSecretBackendRole#max_ttl}
---
@@ -1401,7 +1401,7 @@ public string Namespace { get; set; }
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#namespace AzureSecretBackendRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#namespace AzureSecretBackendRole#namespace}
---
@@ -1415,7 +1415,7 @@ public object PermanentlyDelete { get; set; }
Indicates whether the applications and service principals created by Vault will be permanently deleted when the corresponding leases expire.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#permanently_delete AzureSecretBackendRole#permanently_delete}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#permanently_delete AzureSecretBackendRole#permanently_delete}
---
@@ -1431,7 +1431,7 @@ Specifies the security principal types that are allowed to sign in to the applic
Valid values are: AzureADMyOrg, AzureADMultipleOrgs, AzureADandPersonalMicrosoftAccount, PersonalMicrosoftAccount
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#sign_in_audience AzureSecretBackendRole#sign_in_audience}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#sign_in_audience AzureSecretBackendRole#sign_in_audience}
---
@@ -1445,7 +1445,7 @@ public string[] Tags { get; set; }
Comma-separated strings of Azure tags to attach to an application.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#tags AzureSecretBackendRole#tags}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#tags AzureSecretBackendRole#tags}
---
@@ -1459,7 +1459,7 @@ public string Ttl { get; set; }
Human-friendly description of the mount for the backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#ttl AzureSecretBackendRole#ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#ttl AzureSecretBackendRole#ttl}
---
diff --git a/docs/azureSecretBackendRole.go.md b/docs/azureSecretBackendRole.go.md
index 60cc7b75..15dffe55 100644
--- a/docs/azureSecretBackendRole.go.md
+++ b/docs/azureSecretBackendRole.go.md
@@ -4,7 +4,7 @@
### AzureSecretBackendRole
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role vault_azure_secret_backend_role}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role vault_azure_secret_backend_role}.
#### Initializers
@@ -577,7 +577,7 @@ The construct id used in the generated config for the AzureSecretBackendRole to
The id of the existing AzureSecretBackendRole that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#import import section} in the documentation of this resource for the id to use
---
@@ -1074,7 +1074,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/azuresecretbackendrol
| **Name** | **Type** | **Description** |
| --- | --- | --- |
-| GroupName
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#group_name AzureSecretBackendRole#group_name}. |
+| GroupName
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#group_name AzureSecretBackendRole#group_name}. |
---
@@ -1086,7 +1086,7 @@ GroupName *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#group_name AzureSecretBackendRole#group_name}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#group_name AzureSecretBackendRole#group_name}.
---
@@ -1108,9 +1108,9 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/azuresecretbackendrol
| **Name** | **Type** | **Description** |
| --- | --- | --- |
-| Scope
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#scope AzureSecretBackendRole#scope}. |
-| RoleId
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#role_id AzureSecretBackendRole#role_id}. |
-| RoleName
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#role_name AzureSecretBackendRole#role_name}. |
+| Scope
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#scope AzureSecretBackendRole#scope}. |
+| RoleId
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#role_id AzureSecretBackendRole#role_id}. |
+| RoleName
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#role_name AzureSecretBackendRole#role_name}. |
---
@@ -1122,7 +1122,7 @@ Scope *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#scope AzureSecretBackendRole#scope}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#scope AzureSecretBackendRole#scope}.
---
@@ -1134,7 +1134,7 @@ RoleId *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#role_id AzureSecretBackendRole#role_id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#role_id AzureSecretBackendRole#role_id}.
---
@@ -1146,7 +1146,7 @@ RoleName *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#role_name AzureSecretBackendRole#role_name}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#role_name AzureSecretBackendRole#role_name}.
---
@@ -1198,7 +1198,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/azuresecretbackendrol
| AzureRoles
| interface{}
| azure_roles block. |
| Backend
| *string
| Unique name of the auth backend to configure. |
| Description
| *string
| Human-friendly description of the mount for the backend. |
-| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#id AzureSecretBackendRole#id}. |
+| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#id AzureSecretBackendRole#id}. |
| MaxTtl
| *string
| Human-friendly description of the mount for the backend. |
| Namespace
| *string
| Target namespace. (requires Enterprise). |
| PermanentlyDelete
| interface{}
| Indicates whether the applications and service principals created by Vault will be permanently deleted when the corresponding leases expire. |
@@ -1288,7 +1288,7 @@ Role *string
Name of the role to create.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#role AzureSecretBackendRole#role}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#role AzureSecretBackendRole#role}
---
@@ -1302,7 +1302,7 @@ ApplicationObjectId *string
Application Object ID for an existing service principal that will be used instead of creating dynamic service principals.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#application_object_id AzureSecretBackendRole#application_object_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#application_object_id AzureSecretBackendRole#application_object_id}
---
@@ -1316,7 +1316,7 @@ AzureGroups interface{}
azure_groups block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#azure_groups AzureSecretBackendRole#azure_groups}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#azure_groups AzureSecretBackendRole#azure_groups}
---
@@ -1330,7 +1330,7 @@ AzureRoles interface{}
azure_roles block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#azure_roles AzureSecretBackendRole#azure_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#azure_roles AzureSecretBackendRole#azure_roles}
---
@@ -1344,7 +1344,7 @@ Backend *string
Unique name of the auth backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#backend AzureSecretBackendRole#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#backend AzureSecretBackendRole#backend}
---
@@ -1358,7 +1358,7 @@ Description *string
Human-friendly description of the mount for the backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#description AzureSecretBackendRole#description}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#description AzureSecretBackendRole#description}
---
@@ -1370,7 +1370,7 @@ Id *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#id AzureSecretBackendRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#id AzureSecretBackendRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1387,7 +1387,7 @@ MaxTtl *string
Human-friendly description of the mount for the backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#max_ttl AzureSecretBackendRole#max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#max_ttl AzureSecretBackendRole#max_ttl}
---
@@ -1401,7 +1401,7 @@ Namespace *string
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#namespace AzureSecretBackendRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#namespace AzureSecretBackendRole#namespace}
---
@@ -1415,7 +1415,7 @@ PermanentlyDelete interface{}
Indicates whether the applications and service principals created by Vault will be permanently deleted when the corresponding leases expire.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#permanently_delete AzureSecretBackendRole#permanently_delete}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#permanently_delete AzureSecretBackendRole#permanently_delete}
---
@@ -1431,7 +1431,7 @@ Specifies the security principal types that are allowed to sign in to the applic
Valid values are: AzureADMyOrg, AzureADMultipleOrgs, AzureADandPersonalMicrosoftAccount, PersonalMicrosoftAccount
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#sign_in_audience AzureSecretBackendRole#sign_in_audience}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#sign_in_audience AzureSecretBackendRole#sign_in_audience}
---
@@ -1445,7 +1445,7 @@ Tags *[]*string
Comma-separated strings of Azure tags to attach to an application.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#tags AzureSecretBackendRole#tags}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#tags AzureSecretBackendRole#tags}
---
@@ -1459,7 +1459,7 @@ Ttl *string
Human-friendly description of the mount for the backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#ttl AzureSecretBackendRole#ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#ttl AzureSecretBackendRole#ttl}
---
diff --git a/docs/azureSecretBackendRole.java.md b/docs/azureSecretBackendRole.java.md
index 40a545a0..604d9d60 100644
--- a/docs/azureSecretBackendRole.java.md
+++ b/docs/azureSecretBackendRole.java.md
@@ -4,7 +4,7 @@
### AzureSecretBackendRole
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role vault_azure_secret_backend_role}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role vault_azure_secret_backend_role}.
#### Initializers
@@ -59,7 +59,7 @@ AzureSecretBackendRole.Builder.create(Construct scope, java.lang.String id)
| azureRoles
| com.hashicorp.cdktf.IResolvable OR java.util.List<AzureSecretBackendRoleAzureRoles>
| azure_roles block. |
| backend
| java.lang.String
| Unique name of the auth backend to configure. |
| description
| java.lang.String
| Human-friendly description of the mount for the backend. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#id AzureSecretBackendRole#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#id AzureSecretBackendRole#id}. |
| maxTtl
| java.lang.String
| Human-friendly description of the mount for the backend. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
| permanentlyDelete
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| Indicates whether the applications and service principals created by Vault will be permanently deleted when the corresponding leases expire. |
@@ -135,7 +135,7 @@ Must be unique amongst siblings in the same scope
Name of the role to create.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#role AzureSecretBackendRole#role}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#role AzureSecretBackendRole#role}
---
@@ -145,7 +145,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Application Object ID for an existing service principal that will be used instead of creating dynamic service principals.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#application_object_id AzureSecretBackendRole#application_object_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#application_object_id AzureSecretBackendRole#application_object_id}
---
@@ -155,7 +155,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
azure_groups block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#azure_groups AzureSecretBackendRole#azure_groups}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#azure_groups AzureSecretBackendRole#azure_groups}
---
@@ -165,7 +165,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
azure_roles block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#azure_roles AzureSecretBackendRole#azure_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#azure_roles AzureSecretBackendRole#azure_roles}
---
@@ -175,7 +175,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Unique name of the auth backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#backend AzureSecretBackendRole#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#backend AzureSecretBackendRole#backend}
---
@@ -185,7 +185,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Human-friendly description of the mount for the backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#description AzureSecretBackendRole#description}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#description AzureSecretBackendRole#description}
---
@@ -193,7 +193,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#id AzureSecretBackendRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#id AzureSecretBackendRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -206,7 +206,7 @@ If you experience problems setting this value it might not be settable. Please t
Human-friendly description of the mount for the backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#max_ttl AzureSecretBackendRole#max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#max_ttl AzureSecretBackendRole#max_ttl}
---
@@ -216,7 +216,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#namespace AzureSecretBackendRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#namespace AzureSecretBackendRole#namespace}
---
@@ -226,7 +226,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Indicates whether the applications and service principals created by Vault will be permanently deleted when the corresponding leases expire.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#permanently_delete AzureSecretBackendRole#permanently_delete}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#permanently_delete AzureSecretBackendRole#permanently_delete}
---
@@ -238,7 +238,7 @@ Specifies the security principal types that are allowed to sign in to the applic
Valid values are: AzureADMyOrg, AzureADMultipleOrgs, AzureADandPersonalMicrosoftAccount, PersonalMicrosoftAccount
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#sign_in_audience AzureSecretBackendRole#sign_in_audience}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#sign_in_audience AzureSecretBackendRole#sign_in_audience}
---
@@ -248,7 +248,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Comma-separated strings of Azure tags to attach to an application.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#tags AzureSecretBackendRole#tags}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#tags AzureSecretBackendRole#tags}
---
@@ -258,7 +258,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Human-friendly description of the mount for the backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#ttl AzureSecretBackendRole#ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#ttl AzureSecretBackendRole#ttl}
---
@@ -795,7 +795,7 @@ The construct id used in the generated config for the AzureSecretBackendRole to
The id of the existing AzureSecretBackendRole that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#import import section} in the documentation of this resource for the id to use
---
@@ -1292,7 +1292,7 @@ AzureSecretBackendRoleAzureGroups.builder()
| **Name** | **Type** | **Description** |
| --- | --- | --- |
-| groupName
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#group_name AzureSecretBackendRole#group_name}. |
+| groupName
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#group_name AzureSecretBackendRole#group_name}. |
---
@@ -1304,7 +1304,7 @@ public java.lang.String getGroupName();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#group_name AzureSecretBackendRole#group_name}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#group_name AzureSecretBackendRole#group_name}.
---
@@ -1326,9 +1326,9 @@ AzureSecretBackendRoleAzureRoles.builder()
| **Name** | **Type** | **Description** |
| --- | --- | --- |
-| scope
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#scope AzureSecretBackendRole#scope}. |
-| roleId
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#role_id AzureSecretBackendRole#role_id}. |
-| roleName
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#role_name AzureSecretBackendRole#role_name}. |
+| scope
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#scope AzureSecretBackendRole#scope}. |
+| roleId
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#role_id AzureSecretBackendRole#role_id}. |
+| roleName
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#role_name AzureSecretBackendRole#role_name}. |
---
@@ -1340,7 +1340,7 @@ public java.lang.String getScope();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#scope AzureSecretBackendRole#scope}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#scope AzureSecretBackendRole#scope}.
---
@@ -1352,7 +1352,7 @@ public java.lang.String getRoleId();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#role_id AzureSecretBackendRole#role_id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#role_id AzureSecretBackendRole#role_id}.
---
@@ -1364,7 +1364,7 @@ public java.lang.String getRoleName();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#role_name AzureSecretBackendRole#role_name}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#role_name AzureSecretBackendRole#role_name}.
---
@@ -1423,7 +1423,7 @@ AzureSecretBackendRoleConfig.builder()
| azureRoles
| com.hashicorp.cdktf.IResolvable OR java.util.List<AzureSecretBackendRoleAzureRoles>
| azure_roles block. |
| backend
| java.lang.String
| Unique name of the auth backend to configure. |
| description
| java.lang.String
| Human-friendly description of the mount for the backend. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#id AzureSecretBackendRole#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#id AzureSecretBackendRole#id}. |
| maxTtl
| java.lang.String
| Human-friendly description of the mount for the backend. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
| permanentlyDelete
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| Indicates whether the applications and service principals created by Vault will be permanently deleted when the corresponding leases expire. |
@@ -1513,7 +1513,7 @@ public java.lang.String getRole();
Name of the role to create.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#role AzureSecretBackendRole#role}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#role AzureSecretBackendRole#role}
---
@@ -1527,7 +1527,7 @@ public java.lang.String getApplicationObjectId();
Application Object ID for an existing service principal that will be used instead of creating dynamic service principals.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#application_object_id AzureSecretBackendRole#application_object_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#application_object_id AzureSecretBackendRole#application_object_id}
---
@@ -1541,7 +1541,7 @@ public java.lang.Object getAzureGroups();
azure_groups block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#azure_groups AzureSecretBackendRole#azure_groups}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#azure_groups AzureSecretBackendRole#azure_groups}
---
@@ -1555,7 +1555,7 @@ public java.lang.Object getAzureRoles();
azure_roles block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#azure_roles AzureSecretBackendRole#azure_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#azure_roles AzureSecretBackendRole#azure_roles}
---
@@ -1569,7 +1569,7 @@ public java.lang.String getBackend();
Unique name of the auth backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#backend AzureSecretBackendRole#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#backend AzureSecretBackendRole#backend}
---
@@ -1583,7 +1583,7 @@ public java.lang.String getDescription();
Human-friendly description of the mount for the backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#description AzureSecretBackendRole#description}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#description AzureSecretBackendRole#description}
---
@@ -1595,7 +1595,7 @@ public java.lang.String getId();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#id AzureSecretBackendRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#id AzureSecretBackendRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1612,7 +1612,7 @@ public java.lang.String getMaxTtl();
Human-friendly description of the mount for the backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#max_ttl AzureSecretBackendRole#max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#max_ttl AzureSecretBackendRole#max_ttl}
---
@@ -1626,7 +1626,7 @@ public java.lang.String getNamespace();
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#namespace AzureSecretBackendRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#namespace AzureSecretBackendRole#namespace}
---
@@ -1640,7 +1640,7 @@ public java.lang.Object getPermanentlyDelete();
Indicates whether the applications and service principals created by Vault will be permanently deleted when the corresponding leases expire.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#permanently_delete AzureSecretBackendRole#permanently_delete}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#permanently_delete AzureSecretBackendRole#permanently_delete}
---
@@ -1656,7 +1656,7 @@ Specifies the security principal types that are allowed to sign in to the applic
Valid values are: AzureADMyOrg, AzureADMultipleOrgs, AzureADandPersonalMicrosoftAccount, PersonalMicrosoftAccount
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#sign_in_audience AzureSecretBackendRole#sign_in_audience}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#sign_in_audience AzureSecretBackendRole#sign_in_audience}
---
@@ -1670,7 +1670,7 @@ public java.util.List getTags();
Comma-separated strings of Azure tags to attach to an application.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#tags AzureSecretBackendRole#tags}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#tags AzureSecretBackendRole#tags}
---
@@ -1684,7 +1684,7 @@ public java.lang.String getTtl();
Human-friendly description of the mount for the backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#ttl AzureSecretBackendRole#ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#ttl AzureSecretBackendRole#ttl}
---
diff --git a/docs/azureSecretBackendRole.python.md b/docs/azureSecretBackendRole.python.md
index d9c52af1..db828d38 100644
--- a/docs/azureSecretBackendRole.python.md
+++ b/docs/azureSecretBackendRole.python.md
@@ -4,7 +4,7 @@
### AzureSecretBackendRole
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role vault_azure_secret_backend_role}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role vault_azure_secret_backend_role}.
#### Initializers
@@ -54,7 +54,7 @@ azureSecretBackendRole.AzureSecretBackendRole(
| azure_roles
| typing.Union[cdktf.IResolvable, typing.List[AzureSecretBackendRoleAzureRoles]]
| azure_roles block. |
| backend
| str
| Unique name of the auth backend to configure. |
| description
| str
| Human-friendly description of the mount for the backend. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#id AzureSecretBackendRole#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#id AzureSecretBackendRole#id}. |
| max_ttl
| str
| Human-friendly description of the mount for the backend. |
| namespace
| str
| Target namespace. (requires Enterprise). |
| permanently_delete
| typing.Union[bool, cdktf.IResolvable]
| Indicates whether the applications and service principals created by Vault will be permanently deleted when the corresponding leases expire. |
@@ -130,7 +130,7 @@ Must be unique amongst siblings in the same scope
Name of the role to create.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#role AzureSecretBackendRole#role}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#role AzureSecretBackendRole#role}
---
@@ -140,7 +140,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Application Object ID for an existing service principal that will be used instead of creating dynamic service principals.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#application_object_id AzureSecretBackendRole#application_object_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#application_object_id AzureSecretBackendRole#application_object_id}
---
@@ -150,7 +150,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
azure_groups block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#azure_groups AzureSecretBackendRole#azure_groups}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#azure_groups AzureSecretBackendRole#azure_groups}
---
@@ -160,7 +160,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
azure_roles block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#azure_roles AzureSecretBackendRole#azure_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#azure_roles AzureSecretBackendRole#azure_roles}
---
@@ -170,7 +170,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Unique name of the auth backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#backend AzureSecretBackendRole#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#backend AzureSecretBackendRole#backend}
---
@@ -180,7 +180,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Human-friendly description of the mount for the backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#description AzureSecretBackendRole#description}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#description AzureSecretBackendRole#description}
---
@@ -188,7 +188,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#id AzureSecretBackendRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#id AzureSecretBackendRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -201,7 +201,7 @@ If you experience problems setting this value it might not be settable. Please t
Human-friendly description of the mount for the backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#max_ttl AzureSecretBackendRole#max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#max_ttl AzureSecretBackendRole#max_ttl}
---
@@ -211,7 +211,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#namespace AzureSecretBackendRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#namespace AzureSecretBackendRole#namespace}
---
@@ -221,7 +221,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Indicates whether the applications and service principals created by Vault will be permanently deleted when the corresponding leases expire.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#permanently_delete AzureSecretBackendRole#permanently_delete}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#permanently_delete AzureSecretBackendRole#permanently_delete}
---
@@ -233,7 +233,7 @@ Specifies the security principal types that are allowed to sign in to the applic
Valid values are: AzureADMyOrg, AzureADMultipleOrgs, AzureADandPersonalMicrosoftAccount, PersonalMicrosoftAccount
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#sign_in_audience AzureSecretBackendRole#sign_in_audience}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#sign_in_audience AzureSecretBackendRole#sign_in_audience}
---
@@ -243,7 +243,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Comma-separated strings of Azure tags to attach to an application.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#tags AzureSecretBackendRole#tags}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#tags AzureSecretBackendRole#tags}
---
@@ -253,7 +253,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Human-friendly description of the mount for the backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#ttl AzureSecretBackendRole#ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#ttl AzureSecretBackendRole#ttl}
---
@@ -840,7 +840,7 @@ The construct id used in the generated config for the AzureSecretBackendRole to
The id of the existing AzureSecretBackendRole that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#import import section} in the documentation of this resource for the id to use
---
@@ -1337,7 +1337,7 @@ azureSecretBackendRole.AzureSecretBackendRoleAzureGroups(
| **Name** | **Type** | **Description** |
| --- | --- | --- |
-| group_name
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#group_name AzureSecretBackendRole#group_name}. |
+| group_name
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#group_name AzureSecretBackendRole#group_name}. |
---
@@ -1349,7 +1349,7 @@ group_name: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#group_name AzureSecretBackendRole#group_name}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#group_name AzureSecretBackendRole#group_name}.
---
@@ -1371,9 +1371,9 @@ azureSecretBackendRole.AzureSecretBackendRoleAzureRoles(
| **Name** | **Type** | **Description** |
| --- | --- | --- |
-| scope
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#scope AzureSecretBackendRole#scope}. |
-| role_id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#role_id AzureSecretBackendRole#role_id}. |
-| role_name
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#role_name AzureSecretBackendRole#role_name}. |
+| scope
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#scope AzureSecretBackendRole#scope}. |
+| role_id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#role_id AzureSecretBackendRole#role_id}. |
+| role_name
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#role_name AzureSecretBackendRole#role_name}. |
---
@@ -1385,7 +1385,7 @@ scope: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#scope AzureSecretBackendRole#scope}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#scope AzureSecretBackendRole#scope}.
---
@@ -1397,7 +1397,7 @@ role_id: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#role_id AzureSecretBackendRole#role_id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#role_id AzureSecretBackendRole#role_id}.
---
@@ -1409,7 +1409,7 @@ role_name: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#role_name AzureSecretBackendRole#role_name}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#role_name AzureSecretBackendRole#role_name}.
---
@@ -1461,7 +1461,7 @@ azureSecretBackendRole.AzureSecretBackendRoleConfig(
| azure_roles
| typing.Union[cdktf.IResolvable, typing.List[AzureSecretBackendRoleAzureRoles]]
| azure_roles block. |
| backend
| str
| Unique name of the auth backend to configure. |
| description
| str
| Human-friendly description of the mount for the backend. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#id AzureSecretBackendRole#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#id AzureSecretBackendRole#id}. |
| max_ttl
| str
| Human-friendly description of the mount for the backend. |
| namespace
| str
| Target namespace. (requires Enterprise). |
| permanently_delete
| typing.Union[bool, cdktf.IResolvable]
| Indicates whether the applications and service principals created by Vault will be permanently deleted when the corresponding leases expire. |
@@ -1551,7 +1551,7 @@ role: str
Name of the role to create.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#role AzureSecretBackendRole#role}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#role AzureSecretBackendRole#role}
---
@@ -1565,7 +1565,7 @@ application_object_id: str
Application Object ID for an existing service principal that will be used instead of creating dynamic service principals.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#application_object_id AzureSecretBackendRole#application_object_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#application_object_id AzureSecretBackendRole#application_object_id}
---
@@ -1579,7 +1579,7 @@ azure_groups: typing.Union[IResolvable, typing.List[AzureSecretBackendRoleAzureG
azure_groups block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#azure_groups AzureSecretBackendRole#azure_groups}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#azure_groups AzureSecretBackendRole#azure_groups}
---
@@ -1593,7 +1593,7 @@ azure_roles: typing.Union[IResolvable, typing.List[AzureSecretBackendRoleAzureRo
azure_roles block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#azure_roles AzureSecretBackendRole#azure_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#azure_roles AzureSecretBackendRole#azure_roles}
---
@@ -1607,7 +1607,7 @@ backend: str
Unique name of the auth backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#backend AzureSecretBackendRole#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#backend AzureSecretBackendRole#backend}
---
@@ -1621,7 +1621,7 @@ description: str
Human-friendly description of the mount for the backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#description AzureSecretBackendRole#description}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#description AzureSecretBackendRole#description}
---
@@ -1633,7 +1633,7 @@ id: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#id AzureSecretBackendRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#id AzureSecretBackendRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1650,7 +1650,7 @@ max_ttl: str
Human-friendly description of the mount for the backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#max_ttl AzureSecretBackendRole#max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#max_ttl AzureSecretBackendRole#max_ttl}
---
@@ -1664,7 +1664,7 @@ namespace: str
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#namespace AzureSecretBackendRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#namespace AzureSecretBackendRole#namespace}
---
@@ -1678,7 +1678,7 @@ permanently_delete: typing.Union[bool, IResolvable]
Indicates whether the applications and service principals created by Vault will be permanently deleted when the corresponding leases expire.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#permanently_delete AzureSecretBackendRole#permanently_delete}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#permanently_delete AzureSecretBackendRole#permanently_delete}
---
@@ -1694,7 +1694,7 @@ Specifies the security principal types that are allowed to sign in to the applic
Valid values are: AzureADMyOrg, AzureADMultipleOrgs, AzureADandPersonalMicrosoftAccount, PersonalMicrosoftAccount
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#sign_in_audience AzureSecretBackendRole#sign_in_audience}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#sign_in_audience AzureSecretBackendRole#sign_in_audience}
---
@@ -1708,7 +1708,7 @@ tags: typing.List[str]
Comma-separated strings of Azure tags to attach to an application.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#tags AzureSecretBackendRole#tags}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#tags AzureSecretBackendRole#tags}
---
@@ -1722,7 +1722,7 @@ ttl: str
Human-friendly description of the mount for the backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#ttl AzureSecretBackendRole#ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#ttl AzureSecretBackendRole#ttl}
---
diff --git a/docs/azureSecretBackendRole.typescript.md b/docs/azureSecretBackendRole.typescript.md
index 2fb5c337..acca03a4 100644
--- a/docs/azureSecretBackendRole.typescript.md
+++ b/docs/azureSecretBackendRole.typescript.md
@@ -4,7 +4,7 @@
### AzureSecretBackendRole
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role vault_azure_secret_backend_role}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role vault_azure_secret_backend_role}.
#### Initializers
@@ -577,7 +577,7 @@ The construct id used in the generated config for the AzureSecretBackendRole to
The id of the existing AzureSecretBackendRole that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#import import section} in the documentation of this resource for the id to use
---
@@ -1072,7 +1072,7 @@ const azureSecretBackendRoleAzureGroups: azureSecretBackendRole.AzureSecretBacke
| **Name** | **Type** | **Description** |
| --- | --- | --- |
-| groupName
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#group_name AzureSecretBackendRole#group_name}. |
+| groupName
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#group_name AzureSecretBackendRole#group_name}. |
---
@@ -1084,7 +1084,7 @@ public readonly groupName: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#group_name AzureSecretBackendRole#group_name}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#group_name AzureSecretBackendRole#group_name}.
---
@@ -1102,9 +1102,9 @@ const azureSecretBackendRoleAzureRoles: azureSecretBackendRole.AzureSecretBacken
| **Name** | **Type** | **Description** |
| --- | --- | --- |
-| scope
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#scope AzureSecretBackendRole#scope}. |
-| roleId
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#role_id AzureSecretBackendRole#role_id}. |
-| roleName
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#role_name AzureSecretBackendRole#role_name}. |
+| scope
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#scope AzureSecretBackendRole#scope}. |
+| roleId
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#role_id AzureSecretBackendRole#role_id}. |
+| roleName
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#role_name AzureSecretBackendRole#role_name}. |
---
@@ -1116,7 +1116,7 @@ public readonly scope: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#scope AzureSecretBackendRole#scope}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#scope AzureSecretBackendRole#scope}.
---
@@ -1128,7 +1128,7 @@ public readonly roleId: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#role_id AzureSecretBackendRole#role_id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#role_id AzureSecretBackendRole#role_id}.
---
@@ -1140,7 +1140,7 @@ public readonly roleName: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#role_name AzureSecretBackendRole#role_name}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#role_name AzureSecretBackendRole#role_name}.
---
@@ -1171,7 +1171,7 @@ const azureSecretBackendRoleConfig: azureSecretBackendRole.AzureSecretBackendRol
| azureRoles
| cdktf.IResolvable \| AzureSecretBackendRoleAzureRoles[]
| azure_roles block. |
| backend
| string
| Unique name of the auth backend to configure. |
| description
| string
| Human-friendly description of the mount for the backend. |
-| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#id AzureSecretBackendRole#id}. |
+| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#id AzureSecretBackendRole#id}. |
| maxTtl
| string
| Human-friendly description of the mount for the backend. |
| namespace
| string
| Target namespace. (requires Enterprise). |
| permanentlyDelete
| boolean \| cdktf.IResolvable
| Indicates whether the applications and service principals created by Vault will be permanently deleted when the corresponding leases expire. |
@@ -1261,7 +1261,7 @@ public readonly role: string;
Name of the role to create.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#role AzureSecretBackendRole#role}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#role AzureSecretBackendRole#role}
---
@@ -1275,7 +1275,7 @@ public readonly applicationObjectId: string;
Application Object ID for an existing service principal that will be used instead of creating dynamic service principals.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#application_object_id AzureSecretBackendRole#application_object_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#application_object_id AzureSecretBackendRole#application_object_id}
---
@@ -1289,7 +1289,7 @@ public readonly azureGroups: IResolvable | AzureSecretBackendRoleAzureGroups[];
azure_groups block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#azure_groups AzureSecretBackendRole#azure_groups}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#azure_groups AzureSecretBackendRole#azure_groups}
---
@@ -1303,7 +1303,7 @@ public readonly azureRoles: IResolvable | AzureSecretBackendRoleAzureRoles[];
azure_roles block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#azure_roles AzureSecretBackendRole#azure_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#azure_roles AzureSecretBackendRole#azure_roles}
---
@@ -1317,7 +1317,7 @@ public readonly backend: string;
Unique name of the auth backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#backend AzureSecretBackendRole#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#backend AzureSecretBackendRole#backend}
---
@@ -1331,7 +1331,7 @@ public readonly description: string;
Human-friendly description of the mount for the backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#description AzureSecretBackendRole#description}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#description AzureSecretBackendRole#description}
---
@@ -1343,7 +1343,7 @@ public readonly id: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#id AzureSecretBackendRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#id AzureSecretBackendRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1360,7 +1360,7 @@ public readonly maxTtl: string;
Human-friendly description of the mount for the backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#max_ttl AzureSecretBackendRole#max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#max_ttl AzureSecretBackendRole#max_ttl}
---
@@ -1374,7 +1374,7 @@ public readonly namespace: string;
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#namespace AzureSecretBackendRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#namespace AzureSecretBackendRole#namespace}
---
@@ -1388,7 +1388,7 @@ public readonly permanentlyDelete: boolean | IResolvable;
Indicates whether the applications and service principals created by Vault will be permanently deleted when the corresponding leases expire.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#permanently_delete AzureSecretBackendRole#permanently_delete}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#permanently_delete AzureSecretBackendRole#permanently_delete}
---
@@ -1404,7 +1404,7 @@ Specifies the security principal types that are allowed to sign in to the applic
Valid values are: AzureADMyOrg, AzureADMultipleOrgs, AzureADandPersonalMicrosoftAccount, PersonalMicrosoftAccount
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#sign_in_audience AzureSecretBackendRole#sign_in_audience}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#sign_in_audience AzureSecretBackendRole#sign_in_audience}
---
@@ -1418,7 +1418,7 @@ public readonly tags: string[];
Comma-separated strings of Azure tags to attach to an application.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#tags AzureSecretBackendRole#tags}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#tags AzureSecretBackendRole#tags}
---
@@ -1432,7 +1432,7 @@ public readonly ttl: string;
Human-friendly description of the mount for the backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#ttl AzureSecretBackendRole#ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#ttl AzureSecretBackendRole#ttl}
---
diff --git a/docs/certAuthBackendRole.csharp.md b/docs/certAuthBackendRole.csharp.md
index c75fbddc..4b141722 100644
--- a/docs/certAuthBackendRole.csharp.md
+++ b/docs/certAuthBackendRole.csharp.md
@@ -4,7 +4,7 @@
### CertAuthBackendRole
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role vault_cert_auth_backend_role}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role vault_cert_auth_backend_role}.
#### Initializers
@@ -642,7 +642,7 @@ The construct id used in the generated config for the CertAuthBackendRole to imp
The id of the existing CertAuthBackendRole that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#import import section} in the documentation of this resource for the id to use
---
@@ -1487,24 +1487,24 @@ new CertAuthBackendRoleConfig {
| Lifecycle
| HashiCorp.Cdktf.TerraformResourceLifecycle
| *No description.* |
| Provider
| HashiCorp.Cdktf.TerraformProvider
| *No description.* |
| Provisioners
| object[]
| *No description.* |
-| Certificate
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#certificate CertAuthBackendRole#certificate}. |
-| Name
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#name CertAuthBackendRole#name}. |
-| AllowedCommonNames
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_common_names CertAuthBackendRole#allowed_common_names}. |
-| AllowedDnsSans
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_dns_sans CertAuthBackendRole#allowed_dns_sans}. |
-| AllowedEmailSans
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_email_sans CertAuthBackendRole#allowed_email_sans}. |
-| AllowedNames
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_names CertAuthBackendRole#allowed_names}. |
-| AllowedOrganizationalUnits
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_organizational_units CertAuthBackendRole#allowed_organizational_units}. |
-| AllowedUriSans
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_uri_sans CertAuthBackendRole#allowed_uri_sans}. |
-| Backend
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#backend CertAuthBackendRole#backend}. |
-| DisplayName
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#display_name CertAuthBackendRole#display_name}. |
-| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#id CertAuthBackendRole#id}. |
+| Certificate
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#certificate CertAuthBackendRole#certificate}. |
+| Name
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#name CertAuthBackendRole#name}. |
+| AllowedCommonNames
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_common_names CertAuthBackendRole#allowed_common_names}. |
+| AllowedDnsSans
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_dns_sans CertAuthBackendRole#allowed_dns_sans}. |
+| AllowedEmailSans
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_email_sans CertAuthBackendRole#allowed_email_sans}. |
+| AllowedNames
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_names CertAuthBackendRole#allowed_names}. |
+| AllowedOrganizationalUnits
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_organizational_units CertAuthBackendRole#allowed_organizational_units}. |
+| AllowedUriSans
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_uri_sans CertAuthBackendRole#allowed_uri_sans}. |
+| Backend
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#backend CertAuthBackendRole#backend}. |
+| DisplayName
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#display_name CertAuthBackendRole#display_name}. |
+| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#id CertAuthBackendRole#id}. |
| Namespace
| string
| Target namespace. (requires Enterprise). |
| OcspCaCertificates
| string
| Any additional CA certificates needed to verify OCSP responses. Provided as base64 encoded PEM data. |
| OcspEnabled
| object
| If enabled, validate certificates' revocation status using OCSP. |
| OcspFailOpen
| object
| If true and an OCSP response cannot be fetched or is of an unknown status, the login will proceed as if the certificate has not been revoked. |
| OcspQueryAllServers
| object
| If set to true, rather than accepting the first successful OCSP response, query all servers and consider the certificate valid only if all servers agree. |
| OcspServersOverride
| string[]
| A comma-separated list of OCSP server addresses. |
-| RequiredExtensions
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#required_extensions CertAuthBackendRole#required_extensions}. |
+| RequiredExtensions
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#required_extensions CertAuthBackendRole#required_extensions}. |
| TokenBoundCidrs
| string[]
| Specifies the blocks of IP addresses which are allowed to use the generated token. |
| TokenExplicitMaxTtl
| double
| Generated Token's Explicit Maximum TTL in seconds. |
| TokenMaxTtl
| double
| The maximum lifetime of the generated token. |
@@ -1595,7 +1595,7 @@ public string Certificate { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#certificate CertAuthBackendRole#certificate}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#certificate CertAuthBackendRole#certificate}.
---
@@ -1607,7 +1607,7 @@ public string Name { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#name CertAuthBackendRole#name}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#name CertAuthBackendRole#name}.
---
@@ -1619,7 +1619,7 @@ public string[] AllowedCommonNames { get; set; }
- *Type:* string[]
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_common_names CertAuthBackendRole#allowed_common_names}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_common_names CertAuthBackendRole#allowed_common_names}.
---
@@ -1631,7 +1631,7 @@ public string[] AllowedDnsSans { get; set; }
- *Type:* string[]
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_dns_sans CertAuthBackendRole#allowed_dns_sans}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_dns_sans CertAuthBackendRole#allowed_dns_sans}.
---
@@ -1643,7 +1643,7 @@ public string[] AllowedEmailSans { get; set; }
- *Type:* string[]
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_email_sans CertAuthBackendRole#allowed_email_sans}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_email_sans CertAuthBackendRole#allowed_email_sans}.
---
@@ -1655,7 +1655,7 @@ public string[] AllowedNames { get; set; }
- *Type:* string[]
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_names CertAuthBackendRole#allowed_names}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_names CertAuthBackendRole#allowed_names}.
---
@@ -1667,7 +1667,7 @@ public string[] AllowedOrganizationalUnits { get; set; }
- *Type:* string[]
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_organizational_units CertAuthBackendRole#allowed_organizational_units}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_organizational_units CertAuthBackendRole#allowed_organizational_units}.
---
@@ -1679,7 +1679,7 @@ public string[] AllowedUriSans { get; set; }
- *Type:* string[]
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_uri_sans CertAuthBackendRole#allowed_uri_sans}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_uri_sans CertAuthBackendRole#allowed_uri_sans}.
---
@@ -1691,7 +1691,7 @@ public string Backend { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#backend CertAuthBackendRole#backend}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#backend CertAuthBackendRole#backend}.
---
@@ -1703,7 +1703,7 @@ public string DisplayName { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#display_name CertAuthBackendRole#display_name}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#display_name CertAuthBackendRole#display_name}.
---
@@ -1715,7 +1715,7 @@ public string Id { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#id CertAuthBackendRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#id CertAuthBackendRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1732,7 +1732,7 @@ public string Namespace { get; set; }
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#namespace CertAuthBackendRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#namespace CertAuthBackendRole#namespace}
---
@@ -1746,7 +1746,7 @@ public string OcspCaCertificates { get; set; }
Any additional CA certificates needed to verify OCSP responses. Provided as base64 encoded PEM data.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#ocsp_ca_certificates CertAuthBackendRole#ocsp_ca_certificates}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#ocsp_ca_certificates CertAuthBackendRole#ocsp_ca_certificates}
---
@@ -1760,7 +1760,7 @@ public object OcspEnabled { get; set; }
If enabled, validate certificates' revocation status using OCSP.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#ocsp_enabled CertAuthBackendRole#ocsp_enabled}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#ocsp_enabled CertAuthBackendRole#ocsp_enabled}
---
@@ -1774,7 +1774,7 @@ public object OcspFailOpen { get; set; }
If true and an OCSP response cannot be fetched or is of an unknown status, the login will proceed as if the certificate has not been revoked.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#ocsp_fail_open CertAuthBackendRole#ocsp_fail_open}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#ocsp_fail_open CertAuthBackendRole#ocsp_fail_open}
---
@@ -1788,7 +1788,7 @@ public object OcspQueryAllServers { get; set; }
If set to true, rather than accepting the first successful OCSP response, query all servers and consider the certificate valid only if all servers agree.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#ocsp_query_all_servers CertAuthBackendRole#ocsp_query_all_servers}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#ocsp_query_all_servers CertAuthBackendRole#ocsp_query_all_servers}
---
@@ -1804,7 +1804,7 @@ A comma-separated list of OCSP server addresses.
If unset, the OCSP server is determined from the AuthorityInformationAccess extension on the certificate being inspected.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#ocsp_servers_override CertAuthBackendRole#ocsp_servers_override}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#ocsp_servers_override CertAuthBackendRole#ocsp_servers_override}
---
@@ -1816,7 +1816,7 @@ public string[] RequiredExtensions { get; set; }
- *Type:* string[]
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#required_extensions CertAuthBackendRole#required_extensions}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#required_extensions CertAuthBackendRole#required_extensions}.
---
@@ -1830,7 +1830,7 @@ public string[] TokenBoundCidrs { get; set; }
Specifies the blocks of IP addresses which are allowed to use the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_bound_cidrs CertAuthBackendRole#token_bound_cidrs}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_bound_cidrs CertAuthBackendRole#token_bound_cidrs}
---
@@ -1844,7 +1844,7 @@ public double TokenExplicitMaxTtl { get; set; }
Generated Token's Explicit Maximum TTL in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_explicit_max_ttl CertAuthBackendRole#token_explicit_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_explicit_max_ttl CertAuthBackendRole#token_explicit_max_ttl}
---
@@ -1858,7 +1858,7 @@ public double TokenMaxTtl { get; set; }
The maximum lifetime of the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_max_ttl CertAuthBackendRole#token_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_max_ttl CertAuthBackendRole#token_max_ttl}
---
@@ -1872,7 +1872,7 @@ public object TokenNoDefaultPolicy { get; set; }
If true, the 'default' policy will not automatically be added to generated tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_no_default_policy CertAuthBackendRole#token_no_default_policy}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_no_default_policy CertAuthBackendRole#token_no_default_policy}
---
@@ -1886,7 +1886,7 @@ public double TokenNumUses { get; set; }
The maximum number of times a token may be used, a value of zero means unlimited.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_num_uses CertAuthBackendRole#token_num_uses}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_num_uses CertAuthBackendRole#token_num_uses}
---
@@ -1900,7 +1900,7 @@ public double TokenPeriod { get; set; }
Generated Token's Period.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_period CertAuthBackendRole#token_period}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_period CertAuthBackendRole#token_period}
---
@@ -1914,7 +1914,7 @@ public string[] TokenPolicies { get; set; }
Generated Token's Policies.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_policies CertAuthBackendRole#token_policies}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_policies CertAuthBackendRole#token_policies}
---
@@ -1928,7 +1928,7 @@ public double TokenTtl { get; set; }
The initial ttl of the token to generate in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_ttl CertAuthBackendRole#token_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_ttl CertAuthBackendRole#token_ttl}
---
@@ -1942,7 +1942,7 @@ public string TokenType { get; set; }
The type of token to generate, service or batch.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_type CertAuthBackendRole#token_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_type CertAuthBackendRole#token_type}
---
diff --git a/docs/certAuthBackendRole.go.md b/docs/certAuthBackendRole.go.md
index e96dc05f..41a635b7 100644
--- a/docs/certAuthBackendRole.go.md
+++ b/docs/certAuthBackendRole.go.md
@@ -4,7 +4,7 @@
### CertAuthBackendRole
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role vault_cert_auth_backend_role}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role vault_cert_auth_backend_role}.
#### Initializers
@@ -642,7 +642,7 @@ The construct id used in the generated config for the CertAuthBackendRole to imp
The id of the existing CertAuthBackendRole that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#import import section} in the documentation of this resource for the id to use
---
@@ -1487,24 +1487,24 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/certauthbackendrole"
| Lifecycle
| github.com/hashicorp/terraform-cdk-go/cdktf.TerraformResourceLifecycle
| *No description.* |
| Provider
| github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProvider
| *No description.* |
| Provisioners
| *[]interface{}
| *No description.* |
-| Certificate
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#certificate CertAuthBackendRole#certificate}. |
-| Name
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#name CertAuthBackendRole#name}. |
-| AllowedCommonNames
| *[]*string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_common_names CertAuthBackendRole#allowed_common_names}. |
-| AllowedDnsSans
| *[]*string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_dns_sans CertAuthBackendRole#allowed_dns_sans}. |
-| AllowedEmailSans
| *[]*string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_email_sans CertAuthBackendRole#allowed_email_sans}. |
-| AllowedNames
| *[]*string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_names CertAuthBackendRole#allowed_names}. |
-| AllowedOrganizationalUnits
| *[]*string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_organizational_units CertAuthBackendRole#allowed_organizational_units}. |
-| AllowedUriSans
| *[]*string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_uri_sans CertAuthBackendRole#allowed_uri_sans}. |
-| Backend
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#backend CertAuthBackendRole#backend}. |
-| DisplayName
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#display_name CertAuthBackendRole#display_name}. |
-| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#id CertAuthBackendRole#id}. |
+| Certificate
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#certificate CertAuthBackendRole#certificate}. |
+| Name
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#name CertAuthBackendRole#name}. |
+| AllowedCommonNames
| *[]*string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_common_names CertAuthBackendRole#allowed_common_names}. |
+| AllowedDnsSans
| *[]*string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_dns_sans CertAuthBackendRole#allowed_dns_sans}. |
+| AllowedEmailSans
| *[]*string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_email_sans CertAuthBackendRole#allowed_email_sans}. |
+| AllowedNames
| *[]*string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_names CertAuthBackendRole#allowed_names}. |
+| AllowedOrganizationalUnits
| *[]*string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_organizational_units CertAuthBackendRole#allowed_organizational_units}. |
+| AllowedUriSans
| *[]*string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_uri_sans CertAuthBackendRole#allowed_uri_sans}. |
+| Backend
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#backend CertAuthBackendRole#backend}. |
+| DisplayName
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#display_name CertAuthBackendRole#display_name}. |
+| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#id CertAuthBackendRole#id}. |
| Namespace
| *string
| Target namespace. (requires Enterprise). |
| OcspCaCertificates
| *string
| Any additional CA certificates needed to verify OCSP responses. Provided as base64 encoded PEM data. |
| OcspEnabled
| interface{}
| If enabled, validate certificates' revocation status using OCSP. |
| OcspFailOpen
| interface{}
| If true and an OCSP response cannot be fetched or is of an unknown status, the login will proceed as if the certificate has not been revoked. |
| OcspQueryAllServers
| interface{}
| If set to true, rather than accepting the first successful OCSP response, query all servers and consider the certificate valid only if all servers agree. |
| OcspServersOverride
| *[]*string
| A comma-separated list of OCSP server addresses. |
-| RequiredExtensions
| *[]*string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#required_extensions CertAuthBackendRole#required_extensions}. |
+| RequiredExtensions
| *[]*string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#required_extensions CertAuthBackendRole#required_extensions}. |
| TokenBoundCidrs
| *[]*string
| Specifies the blocks of IP addresses which are allowed to use the generated token. |
| TokenExplicitMaxTtl
| *f64
| Generated Token's Explicit Maximum TTL in seconds. |
| TokenMaxTtl
| *f64
| The maximum lifetime of the generated token. |
@@ -1595,7 +1595,7 @@ Certificate *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#certificate CertAuthBackendRole#certificate}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#certificate CertAuthBackendRole#certificate}.
---
@@ -1607,7 +1607,7 @@ Name *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#name CertAuthBackendRole#name}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#name CertAuthBackendRole#name}.
---
@@ -1619,7 +1619,7 @@ AllowedCommonNames *[]*string
- *Type:* *[]*string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_common_names CertAuthBackendRole#allowed_common_names}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_common_names CertAuthBackendRole#allowed_common_names}.
---
@@ -1631,7 +1631,7 @@ AllowedDnsSans *[]*string
- *Type:* *[]*string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_dns_sans CertAuthBackendRole#allowed_dns_sans}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_dns_sans CertAuthBackendRole#allowed_dns_sans}.
---
@@ -1643,7 +1643,7 @@ AllowedEmailSans *[]*string
- *Type:* *[]*string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_email_sans CertAuthBackendRole#allowed_email_sans}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_email_sans CertAuthBackendRole#allowed_email_sans}.
---
@@ -1655,7 +1655,7 @@ AllowedNames *[]*string
- *Type:* *[]*string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_names CertAuthBackendRole#allowed_names}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_names CertAuthBackendRole#allowed_names}.
---
@@ -1667,7 +1667,7 @@ AllowedOrganizationalUnits *[]*string
- *Type:* *[]*string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_organizational_units CertAuthBackendRole#allowed_organizational_units}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_organizational_units CertAuthBackendRole#allowed_organizational_units}.
---
@@ -1679,7 +1679,7 @@ AllowedUriSans *[]*string
- *Type:* *[]*string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_uri_sans CertAuthBackendRole#allowed_uri_sans}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_uri_sans CertAuthBackendRole#allowed_uri_sans}.
---
@@ -1691,7 +1691,7 @@ Backend *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#backend CertAuthBackendRole#backend}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#backend CertAuthBackendRole#backend}.
---
@@ -1703,7 +1703,7 @@ DisplayName *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#display_name CertAuthBackendRole#display_name}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#display_name CertAuthBackendRole#display_name}.
---
@@ -1715,7 +1715,7 @@ Id *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#id CertAuthBackendRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#id CertAuthBackendRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1732,7 +1732,7 @@ Namespace *string
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#namespace CertAuthBackendRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#namespace CertAuthBackendRole#namespace}
---
@@ -1746,7 +1746,7 @@ OcspCaCertificates *string
Any additional CA certificates needed to verify OCSP responses. Provided as base64 encoded PEM data.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#ocsp_ca_certificates CertAuthBackendRole#ocsp_ca_certificates}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#ocsp_ca_certificates CertAuthBackendRole#ocsp_ca_certificates}
---
@@ -1760,7 +1760,7 @@ OcspEnabled interface{}
If enabled, validate certificates' revocation status using OCSP.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#ocsp_enabled CertAuthBackendRole#ocsp_enabled}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#ocsp_enabled CertAuthBackendRole#ocsp_enabled}
---
@@ -1774,7 +1774,7 @@ OcspFailOpen interface{}
If true and an OCSP response cannot be fetched or is of an unknown status, the login will proceed as if the certificate has not been revoked.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#ocsp_fail_open CertAuthBackendRole#ocsp_fail_open}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#ocsp_fail_open CertAuthBackendRole#ocsp_fail_open}
---
@@ -1788,7 +1788,7 @@ OcspQueryAllServers interface{}
If set to true, rather than accepting the first successful OCSP response, query all servers and consider the certificate valid only if all servers agree.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#ocsp_query_all_servers CertAuthBackendRole#ocsp_query_all_servers}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#ocsp_query_all_servers CertAuthBackendRole#ocsp_query_all_servers}
---
@@ -1804,7 +1804,7 @@ A comma-separated list of OCSP server addresses.
If unset, the OCSP server is determined from the AuthorityInformationAccess extension on the certificate being inspected.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#ocsp_servers_override CertAuthBackendRole#ocsp_servers_override}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#ocsp_servers_override CertAuthBackendRole#ocsp_servers_override}
---
@@ -1816,7 +1816,7 @@ RequiredExtensions *[]*string
- *Type:* *[]*string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#required_extensions CertAuthBackendRole#required_extensions}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#required_extensions CertAuthBackendRole#required_extensions}.
---
@@ -1830,7 +1830,7 @@ TokenBoundCidrs *[]*string
Specifies the blocks of IP addresses which are allowed to use the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_bound_cidrs CertAuthBackendRole#token_bound_cidrs}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_bound_cidrs CertAuthBackendRole#token_bound_cidrs}
---
@@ -1844,7 +1844,7 @@ TokenExplicitMaxTtl *f64
Generated Token's Explicit Maximum TTL in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_explicit_max_ttl CertAuthBackendRole#token_explicit_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_explicit_max_ttl CertAuthBackendRole#token_explicit_max_ttl}
---
@@ -1858,7 +1858,7 @@ TokenMaxTtl *f64
The maximum lifetime of the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_max_ttl CertAuthBackendRole#token_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_max_ttl CertAuthBackendRole#token_max_ttl}
---
@@ -1872,7 +1872,7 @@ TokenNoDefaultPolicy interface{}
If true, the 'default' policy will not automatically be added to generated tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_no_default_policy CertAuthBackendRole#token_no_default_policy}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_no_default_policy CertAuthBackendRole#token_no_default_policy}
---
@@ -1886,7 +1886,7 @@ TokenNumUses *f64
The maximum number of times a token may be used, a value of zero means unlimited.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_num_uses CertAuthBackendRole#token_num_uses}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_num_uses CertAuthBackendRole#token_num_uses}
---
@@ -1900,7 +1900,7 @@ TokenPeriod *f64
Generated Token's Period.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_period CertAuthBackendRole#token_period}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_period CertAuthBackendRole#token_period}
---
@@ -1914,7 +1914,7 @@ TokenPolicies *[]*string
Generated Token's Policies.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_policies CertAuthBackendRole#token_policies}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_policies CertAuthBackendRole#token_policies}
---
@@ -1928,7 +1928,7 @@ TokenTtl *f64
The initial ttl of the token to generate in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_ttl CertAuthBackendRole#token_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_ttl CertAuthBackendRole#token_ttl}
---
@@ -1942,7 +1942,7 @@ TokenType *string
The type of token to generate, service or batch.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_type CertAuthBackendRole#token_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_type CertAuthBackendRole#token_type}
---
diff --git a/docs/certAuthBackendRole.java.md b/docs/certAuthBackendRole.java.md
index aca1c162..d2d014d8 100644
--- a/docs/certAuthBackendRole.java.md
+++ b/docs/certAuthBackendRole.java.md
@@ -4,7 +4,7 @@
### CertAuthBackendRole
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role vault_cert_auth_backend_role}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role vault_cert_auth_backend_role}.
#### Initializers
@@ -68,24 +68,24 @@ CertAuthBackendRole.Builder.create(Construct scope, java.lang.String id)
| lifecycle
| com.hashicorp.cdktf.TerraformResourceLifecycle
| *No description.* |
| provider
| com.hashicorp.cdktf.TerraformProvider
| *No description.* |
| provisioners
| java.util.List
| *No description.* |
-| certificate
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#certificate CertAuthBackendRole#certificate}. |
-| name
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#name CertAuthBackendRole#name}. |
-| allowedCommonNames
| java.util.List
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_common_names CertAuthBackendRole#allowed_common_names}. |
-| allowedDnsSans
| java.util.List
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_dns_sans CertAuthBackendRole#allowed_dns_sans}. |
-| allowedEmailSans
| java.util.List
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_email_sans CertAuthBackendRole#allowed_email_sans}. |
-| allowedNames
| java.util.List
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_names CertAuthBackendRole#allowed_names}. |
-| allowedOrganizationalUnits
| java.util.List
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_organizational_units CertAuthBackendRole#allowed_organizational_units}. |
-| allowedUriSans
| java.util.List
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_uri_sans CertAuthBackendRole#allowed_uri_sans}. |
-| backend
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#backend CertAuthBackendRole#backend}. |
-| displayName
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#display_name CertAuthBackendRole#display_name}. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#id CertAuthBackendRole#id}. |
+| certificate
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#certificate CertAuthBackendRole#certificate}. |
+| name
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#name CertAuthBackendRole#name}. |
+| allowedCommonNames
| java.util.List
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_common_names CertAuthBackendRole#allowed_common_names}. |
+| allowedDnsSans
| java.util.List
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_dns_sans CertAuthBackendRole#allowed_dns_sans}. |
+| allowedEmailSans
| java.util.List
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_email_sans CertAuthBackendRole#allowed_email_sans}. |
+| allowedNames
| java.util.List
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_names CertAuthBackendRole#allowed_names}. |
+| allowedOrganizationalUnits
| java.util.List
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_organizational_units CertAuthBackendRole#allowed_organizational_units}. |
+| allowedUriSans
| java.util.List
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_uri_sans CertAuthBackendRole#allowed_uri_sans}. |
+| backend
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#backend CertAuthBackendRole#backend}. |
+| displayName
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#display_name CertAuthBackendRole#display_name}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#id CertAuthBackendRole#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
| ocspCaCertificates
| java.lang.String
| Any additional CA certificates needed to verify OCSP responses. Provided as base64 encoded PEM data. |
| ocspEnabled
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| If enabled, validate certificates' revocation status using OCSP. |
| ocspFailOpen
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| If true and an OCSP response cannot be fetched or is of an unknown status, the login will proceed as if the certificate has not been revoked. |
| ocspQueryAllServers
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| If set to true, rather than accepting the first successful OCSP response, query all servers and consider the certificate valid only if all servers agree. |
| ocspServersOverride
| java.util.List
| A comma-separated list of OCSP server addresses. |
-| requiredExtensions
| java.util.List
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#required_extensions CertAuthBackendRole#required_extensions}. |
+| requiredExtensions
| java.util.List
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#required_extensions CertAuthBackendRole#required_extensions}. |
| tokenBoundCidrs
| java.util.List
| Specifies the blocks of IP addresses which are allowed to use the generated token. |
| tokenExplicitMaxTtl
| java.lang.Number
| Generated Token's Explicit Maximum TTL in seconds. |
| tokenMaxTtl
| java.lang.Number
| The maximum lifetime of the generated token. |
@@ -162,7 +162,7 @@ Must be unique amongst siblings in the same scope
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#certificate CertAuthBackendRole#certificate}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#certificate CertAuthBackendRole#certificate}.
---
@@ -170,7 +170,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#name CertAuthBackendRole#name}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#name CertAuthBackendRole#name}.
---
@@ -178,7 +178,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* java.util.List
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_common_names CertAuthBackendRole#allowed_common_names}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_common_names CertAuthBackendRole#allowed_common_names}.
---
@@ -186,7 +186,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* java.util.List
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_dns_sans CertAuthBackendRole#allowed_dns_sans}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_dns_sans CertAuthBackendRole#allowed_dns_sans}.
---
@@ -194,7 +194,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* java.util.List
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_email_sans CertAuthBackendRole#allowed_email_sans}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_email_sans CertAuthBackendRole#allowed_email_sans}.
---
@@ -202,7 +202,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* java.util.List
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_names CertAuthBackendRole#allowed_names}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_names CertAuthBackendRole#allowed_names}.
---
@@ -210,7 +210,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* java.util.List
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_organizational_units CertAuthBackendRole#allowed_organizational_units}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_organizational_units CertAuthBackendRole#allowed_organizational_units}.
---
@@ -218,7 +218,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* java.util.List
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_uri_sans CertAuthBackendRole#allowed_uri_sans}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_uri_sans CertAuthBackendRole#allowed_uri_sans}.
---
@@ -226,7 +226,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#backend CertAuthBackendRole#backend}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#backend CertAuthBackendRole#backend}.
---
@@ -234,7 +234,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#display_name CertAuthBackendRole#display_name}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#display_name CertAuthBackendRole#display_name}.
---
@@ -242,7 +242,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#id CertAuthBackendRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#id CertAuthBackendRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -255,7 +255,7 @@ If you experience problems setting this value it might not be settable. Please t
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#namespace CertAuthBackendRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#namespace CertAuthBackendRole#namespace}
---
@@ -265,7 +265,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Any additional CA certificates needed to verify OCSP responses. Provided as base64 encoded PEM data.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#ocsp_ca_certificates CertAuthBackendRole#ocsp_ca_certificates}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#ocsp_ca_certificates CertAuthBackendRole#ocsp_ca_certificates}
---
@@ -275,7 +275,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
If enabled, validate certificates' revocation status using OCSP.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#ocsp_enabled CertAuthBackendRole#ocsp_enabled}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#ocsp_enabled CertAuthBackendRole#ocsp_enabled}
---
@@ -285,7 +285,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
If true and an OCSP response cannot be fetched or is of an unknown status, the login will proceed as if the certificate has not been revoked.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#ocsp_fail_open CertAuthBackendRole#ocsp_fail_open}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#ocsp_fail_open CertAuthBackendRole#ocsp_fail_open}
---
@@ -295,7 +295,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
If set to true, rather than accepting the first successful OCSP response, query all servers and consider the certificate valid only if all servers agree.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#ocsp_query_all_servers CertAuthBackendRole#ocsp_query_all_servers}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#ocsp_query_all_servers CertAuthBackendRole#ocsp_query_all_servers}
---
@@ -307,7 +307,7 @@ A comma-separated list of OCSP server addresses.
If unset, the OCSP server is determined from the AuthorityInformationAccess extension on the certificate being inspected.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#ocsp_servers_override CertAuthBackendRole#ocsp_servers_override}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#ocsp_servers_override CertAuthBackendRole#ocsp_servers_override}
---
@@ -315,7 +315,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* java.util.List
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#required_extensions CertAuthBackendRole#required_extensions}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#required_extensions CertAuthBackendRole#required_extensions}.
---
@@ -325,7 +325,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Specifies the blocks of IP addresses which are allowed to use the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_bound_cidrs CertAuthBackendRole#token_bound_cidrs}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_bound_cidrs CertAuthBackendRole#token_bound_cidrs}
---
@@ -335,7 +335,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Generated Token's Explicit Maximum TTL in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_explicit_max_ttl CertAuthBackendRole#token_explicit_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_explicit_max_ttl CertAuthBackendRole#token_explicit_max_ttl}
---
@@ -345,7 +345,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The maximum lifetime of the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_max_ttl CertAuthBackendRole#token_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_max_ttl CertAuthBackendRole#token_max_ttl}
---
@@ -355,7 +355,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
If true, the 'default' policy will not automatically be added to generated tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_no_default_policy CertAuthBackendRole#token_no_default_policy}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_no_default_policy CertAuthBackendRole#token_no_default_policy}
---
@@ -365,7 +365,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The maximum number of times a token may be used, a value of zero means unlimited.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_num_uses CertAuthBackendRole#token_num_uses}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_num_uses CertAuthBackendRole#token_num_uses}
---
@@ -375,7 +375,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Generated Token's Period.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_period CertAuthBackendRole#token_period}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_period CertAuthBackendRole#token_period}
---
@@ -385,7 +385,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Generated Token's Policies.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_policies CertAuthBackendRole#token_policies}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_policies CertAuthBackendRole#token_policies}
---
@@ -395,7 +395,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The initial ttl of the token to generate in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_ttl CertAuthBackendRole#token_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_ttl CertAuthBackendRole#token_ttl}
---
@@ -405,7 +405,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The type of token to generate, service or batch.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_type CertAuthBackendRole#token_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_type CertAuthBackendRole#token_type}
---
@@ -1007,7 +1007,7 @@ The construct id used in the generated config for the CertAuthBackendRole to imp
The id of the existing CertAuthBackendRole that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#import import section} in the documentation of this resource for the id to use
---
@@ -1860,24 +1860,24 @@ CertAuthBackendRoleConfig.builder()
| lifecycle
| com.hashicorp.cdktf.TerraformResourceLifecycle
| *No description.* |
| provider
| com.hashicorp.cdktf.TerraformProvider
| *No description.* |
| provisioners
| java.util.List
| *No description.* |
-| certificate
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#certificate CertAuthBackendRole#certificate}. |
-| name
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#name CertAuthBackendRole#name}. |
-| allowedCommonNames
| java.util.List
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_common_names CertAuthBackendRole#allowed_common_names}. |
-| allowedDnsSans
| java.util.List
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_dns_sans CertAuthBackendRole#allowed_dns_sans}. |
-| allowedEmailSans
| java.util.List
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_email_sans CertAuthBackendRole#allowed_email_sans}. |
-| allowedNames
| java.util.List
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_names CertAuthBackendRole#allowed_names}. |
-| allowedOrganizationalUnits
| java.util.List
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_organizational_units CertAuthBackendRole#allowed_organizational_units}. |
-| allowedUriSans
| java.util.List
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_uri_sans CertAuthBackendRole#allowed_uri_sans}. |
-| backend
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#backend CertAuthBackendRole#backend}. |
-| displayName
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#display_name CertAuthBackendRole#display_name}. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#id CertAuthBackendRole#id}. |
+| certificate
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#certificate CertAuthBackendRole#certificate}. |
+| name
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#name CertAuthBackendRole#name}. |
+| allowedCommonNames
| java.util.List
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_common_names CertAuthBackendRole#allowed_common_names}. |
+| allowedDnsSans
| java.util.List
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_dns_sans CertAuthBackendRole#allowed_dns_sans}. |
+| allowedEmailSans
| java.util.List
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_email_sans CertAuthBackendRole#allowed_email_sans}. |
+| allowedNames
| java.util.List
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_names CertAuthBackendRole#allowed_names}. |
+| allowedOrganizationalUnits
| java.util.List
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_organizational_units CertAuthBackendRole#allowed_organizational_units}. |
+| allowedUriSans
| java.util.List
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_uri_sans CertAuthBackendRole#allowed_uri_sans}. |
+| backend
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#backend CertAuthBackendRole#backend}. |
+| displayName
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#display_name CertAuthBackendRole#display_name}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#id CertAuthBackendRole#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
| ocspCaCertificates
| java.lang.String
| Any additional CA certificates needed to verify OCSP responses. Provided as base64 encoded PEM data. |
| ocspEnabled
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| If enabled, validate certificates' revocation status using OCSP. |
| ocspFailOpen
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| If true and an OCSP response cannot be fetched or is of an unknown status, the login will proceed as if the certificate has not been revoked. |
| ocspQueryAllServers
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| If set to true, rather than accepting the first successful OCSP response, query all servers and consider the certificate valid only if all servers agree. |
| ocspServersOverride
| java.util.List
| A comma-separated list of OCSP server addresses. |
-| requiredExtensions
| java.util.List
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#required_extensions CertAuthBackendRole#required_extensions}. |
+| requiredExtensions
| java.util.List
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#required_extensions CertAuthBackendRole#required_extensions}. |
| tokenBoundCidrs
| java.util.List
| Specifies the blocks of IP addresses which are allowed to use the generated token. |
| tokenExplicitMaxTtl
| java.lang.Number
| Generated Token's Explicit Maximum TTL in seconds. |
| tokenMaxTtl
| java.lang.Number
| The maximum lifetime of the generated token. |
@@ -1968,7 +1968,7 @@ public java.lang.String getCertificate();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#certificate CertAuthBackendRole#certificate}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#certificate CertAuthBackendRole#certificate}.
---
@@ -1980,7 +1980,7 @@ public java.lang.String getName();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#name CertAuthBackendRole#name}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#name CertAuthBackendRole#name}.
---
@@ -1992,7 +1992,7 @@ public java.util.List getAllowedCommonNames();
- *Type:* java.util.List
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_common_names CertAuthBackendRole#allowed_common_names}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_common_names CertAuthBackendRole#allowed_common_names}.
---
@@ -2004,7 +2004,7 @@ public java.util.List getAllowedDnsSans();
- *Type:* java.util.List
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_dns_sans CertAuthBackendRole#allowed_dns_sans}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_dns_sans CertAuthBackendRole#allowed_dns_sans}.
---
@@ -2016,7 +2016,7 @@ public java.util.List getAllowedEmailSans();
- *Type:* java.util.List
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_email_sans CertAuthBackendRole#allowed_email_sans}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_email_sans CertAuthBackendRole#allowed_email_sans}.
---
@@ -2028,7 +2028,7 @@ public java.util.List getAllowedNames();
- *Type:* java.util.List
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_names CertAuthBackendRole#allowed_names}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_names CertAuthBackendRole#allowed_names}.
---
@@ -2040,7 +2040,7 @@ public java.util.List getAllowedOrganizationalUnits();
- *Type:* java.util.List
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_organizational_units CertAuthBackendRole#allowed_organizational_units}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_organizational_units CertAuthBackendRole#allowed_organizational_units}.
---
@@ -2052,7 +2052,7 @@ public java.util.List getAllowedUriSans();
- *Type:* java.util.List
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_uri_sans CertAuthBackendRole#allowed_uri_sans}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_uri_sans CertAuthBackendRole#allowed_uri_sans}.
---
@@ -2064,7 +2064,7 @@ public java.lang.String getBackend();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#backend CertAuthBackendRole#backend}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#backend CertAuthBackendRole#backend}.
---
@@ -2076,7 +2076,7 @@ public java.lang.String getDisplayName();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#display_name CertAuthBackendRole#display_name}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#display_name CertAuthBackendRole#display_name}.
---
@@ -2088,7 +2088,7 @@ public java.lang.String getId();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#id CertAuthBackendRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#id CertAuthBackendRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -2105,7 +2105,7 @@ public java.lang.String getNamespace();
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#namespace CertAuthBackendRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#namespace CertAuthBackendRole#namespace}
---
@@ -2119,7 +2119,7 @@ public java.lang.String getOcspCaCertificates();
Any additional CA certificates needed to verify OCSP responses. Provided as base64 encoded PEM data.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#ocsp_ca_certificates CertAuthBackendRole#ocsp_ca_certificates}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#ocsp_ca_certificates CertAuthBackendRole#ocsp_ca_certificates}
---
@@ -2133,7 +2133,7 @@ public java.lang.Object getOcspEnabled();
If enabled, validate certificates' revocation status using OCSP.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#ocsp_enabled CertAuthBackendRole#ocsp_enabled}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#ocsp_enabled CertAuthBackendRole#ocsp_enabled}
---
@@ -2147,7 +2147,7 @@ public java.lang.Object getOcspFailOpen();
If true and an OCSP response cannot be fetched or is of an unknown status, the login will proceed as if the certificate has not been revoked.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#ocsp_fail_open CertAuthBackendRole#ocsp_fail_open}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#ocsp_fail_open CertAuthBackendRole#ocsp_fail_open}
---
@@ -2161,7 +2161,7 @@ public java.lang.Object getOcspQueryAllServers();
If set to true, rather than accepting the first successful OCSP response, query all servers and consider the certificate valid only if all servers agree.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#ocsp_query_all_servers CertAuthBackendRole#ocsp_query_all_servers}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#ocsp_query_all_servers CertAuthBackendRole#ocsp_query_all_servers}
---
@@ -2177,7 +2177,7 @@ A comma-separated list of OCSP server addresses.
If unset, the OCSP server is determined from the AuthorityInformationAccess extension on the certificate being inspected.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#ocsp_servers_override CertAuthBackendRole#ocsp_servers_override}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#ocsp_servers_override CertAuthBackendRole#ocsp_servers_override}
---
@@ -2189,7 +2189,7 @@ public java.util.List getRequiredExtensions();
- *Type:* java.util.List
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#required_extensions CertAuthBackendRole#required_extensions}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#required_extensions CertAuthBackendRole#required_extensions}.
---
@@ -2203,7 +2203,7 @@ public java.util.List getTokenBoundCidrs();
Specifies the blocks of IP addresses which are allowed to use the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_bound_cidrs CertAuthBackendRole#token_bound_cidrs}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_bound_cidrs CertAuthBackendRole#token_bound_cidrs}
---
@@ -2217,7 +2217,7 @@ public java.lang.Number getTokenExplicitMaxTtl();
Generated Token's Explicit Maximum TTL in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_explicit_max_ttl CertAuthBackendRole#token_explicit_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_explicit_max_ttl CertAuthBackendRole#token_explicit_max_ttl}
---
@@ -2231,7 +2231,7 @@ public java.lang.Number getTokenMaxTtl();
The maximum lifetime of the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_max_ttl CertAuthBackendRole#token_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_max_ttl CertAuthBackendRole#token_max_ttl}
---
@@ -2245,7 +2245,7 @@ public java.lang.Object getTokenNoDefaultPolicy();
If true, the 'default' policy will not automatically be added to generated tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_no_default_policy CertAuthBackendRole#token_no_default_policy}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_no_default_policy CertAuthBackendRole#token_no_default_policy}
---
@@ -2259,7 +2259,7 @@ public java.lang.Number getTokenNumUses();
The maximum number of times a token may be used, a value of zero means unlimited.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_num_uses CertAuthBackendRole#token_num_uses}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_num_uses CertAuthBackendRole#token_num_uses}
---
@@ -2273,7 +2273,7 @@ public java.lang.Number getTokenPeriod();
Generated Token's Period.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_period CertAuthBackendRole#token_period}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_period CertAuthBackendRole#token_period}
---
@@ -2287,7 +2287,7 @@ public java.util.List getTokenPolicies();
Generated Token's Policies.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_policies CertAuthBackendRole#token_policies}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_policies CertAuthBackendRole#token_policies}
---
@@ -2301,7 +2301,7 @@ public java.lang.Number getTokenTtl();
The initial ttl of the token to generate in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_ttl CertAuthBackendRole#token_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_ttl CertAuthBackendRole#token_ttl}
---
@@ -2315,7 +2315,7 @@ public java.lang.String getTokenType();
The type of token to generate, service or batch.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_type CertAuthBackendRole#token_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_type CertAuthBackendRole#token_type}
---
diff --git a/docs/certAuthBackendRole.python.md b/docs/certAuthBackendRole.python.md
index 436876bf..cf18c8c3 100644
--- a/docs/certAuthBackendRole.python.md
+++ b/docs/certAuthBackendRole.python.md
@@ -4,7 +4,7 @@
### CertAuthBackendRole
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role vault_cert_auth_backend_role}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role vault_cert_auth_backend_role}.
#### Initializers
@@ -62,24 +62,24 @@ certAuthBackendRole.CertAuthBackendRole(
| lifecycle
| cdktf.TerraformResourceLifecycle
| *No description.* |
| provider
| cdktf.TerraformProvider
| *No description.* |
| provisioners
| typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]]
| *No description.* |
-| certificate
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#certificate CertAuthBackendRole#certificate}. |
-| name
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#name CertAuthBackendRole#name}. |
-| allowed_common_names
| typing.List[str]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_common_names CertAuthBackendRole#allowed_common_names}. |
-| allowed_dns_sans
| typing.List[str]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_dns_sans CertAuthBackendRole#allowed_dns_sans}. |
-| allowed_email_sans
| typing.List[str]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_email_sans CertAuthBackendRole#allowed_email_sans}. |
-| allowed_names
| typing.List[str]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_names CertAuthBackendRole#allowed_names}. |
-| allowed_organizational_units
| typing.List[str]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_organizational_units CertAuthBackendRole#allowed_organizational_units}. |
-| allowed_uri_sans
| typing.List[str]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_uri_sans CertAuthBackendRole#allowed_uri_sans}. |
-| backend
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#backend CertAuthBackendRole#backend}. |
-| display_name
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#display_name CertAuthBackendRole#display_name}. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#id CertAuthBackendRole#id}. |
+| certificate
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#certificate CertAuthBackendRole#certificate}. |
+| name
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#name CertAuthBackendRole#name}. |
+| allowed_common_names
| typing.List[str]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_common_names CertAuthBackendRole#allowed_common_names}. |
+| allowed_dns_sans
| typing.List[str]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_dns_sans CertAuthBackendRole#allowed_dns_sans}. |
+| allowed_email_sans
| typing.List[str]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_email_sans CertAuthBackendRole#allowed_email_sans}. |
+| allowed_names
| typing.List[str]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_names CertAuthBackendRole#allowed_names}. |
+| allowed_organizational_units
| typing.List[str]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_organizational_units CertAuthBackendRole#allowed_organizational_units}. |
+| allowed_uri_sans
| typing.List[str]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_uri_sans CertAuthBackendRole#allowed_uri_sans}. |
+| backend
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#backend CertAuthBackendRole#backend}. |
+| display_name
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#display_name CertAuthBackendRole#display_name}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#id CertAuthBackendRole#id}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
| ocsp_ca_certificates
| str
| Any additional CA certificates needed to verify OCSP responses. Provided as base64 encoded PEM data. |
| ocsp_enabled
| typing.Union[bool, cdktf.IResolvable]
| If enabled, validate certificates' revocation status using OCSP. |
| ocsp_fail_open
| typing.Union[bool, cdktf.IResolvable]
| If true and an OCSP response cannot be fetched or is of an unknown status, the login will proceed as if the certificate has not been revoked. |
| ocsp_query_all_servers
| typing.Union[bool, cdktf.IResolvable]
| If set to true, rather than accepting the first successful OCSP response, query all servers and consider the certificate valid only if all servers agree. |
| ocsp_servers_override
| typing.List[str]
| A comma-separated list of OCSP server addresses. |
-| required_extensions
| typing.List[str]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#required_extensions CertAuthBackendRole#required_extensions}. |
+| required_extensions
| typing.List[str]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#required_extensions CertAuthBackendRole#required_extensions}. |
| token_bound_cidrs
| typing.List[str]
| Specifies the blocks of IP addresses which are allowed to use the generated token. |
| token_explicit_max_ttl
| typing.Union[int, float]
| Generated Token's Explicit Maximum TTL in seconds. |
| token_max_ttl
| typing.Union[int, float]
| The maximum lifetime of the generated token. |
@@ -156,7 +156,7 @@ Must be unique amongst siblings in the same scope
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#certificate CertAuthBackendRole#certificate}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#certificate CertAuthBackendRole#certificate}.
---
@@ -164,7 +164,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#name CertAuthBackendRole#name}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#name CertAuthBackendRole#name}.
---
@@ -172,7 +172,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* typing.List[str]
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_common_names CertAuthBackendRole#allowed_common_names}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_common_names CertAuthBackendRole#allowed_common_names}.
---
@@ -180,7 +180,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* typing.List[str]
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_dns_sans CertAuthBackendRole#allowed_dns_sans}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_dns_sans CertAuthBackendRole#allowed_dns_sans}.
---
@@ -188,7 +188,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* typing.List[str]
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_email_sans CertAuthBackendRole#allowed_email_sans}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_email_sans CertAuthBackendRole#allowed_email_sans}.
---
@@ -196,7 +196,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* typing.List[str]
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_names CertAuthBackendRole#allowed_names}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_names CertAuthBackendRole#allowed_names}.
---
@@ -204,7 +204,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* typing.List[str]
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_organizational_units CertAuthBackendRole#allowed_organizational_units}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_organizational_units CertAuthBackendRole#allowed_organizational_units}.
---
@@ -212,7 +212,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* typing.List[str]
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_uri_sans CertAuthBackendRole#allowed_uri_sans}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_uri_sans CertAuthBackendRole#allowed_uri_sans}.
---
@@ -220,7 +220,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#backend CertAuthBackendRole#backend}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#backend CertAuthBackendRole#backend}.
---
@@ -228,7 +228,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#display_name CertAuthBackendRole#display_name}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#display_name CertAuthBackendRole#display_name}.
---
@@ -236,7 +236,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#id CertAuthBackendRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#id CertAuthBackendRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -249,7 +249,7 @@ If you experience problems setting this value it might not be settable. Please t
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#namespace CertAuthBackendRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#namespace CertAuthBackendRole#namespace}
---
@@ -259,7 +259,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Any additional CA certificates needed to verify OCSP responses. Provided as base64 encoded PEM data.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#ocsp_ca_certificates CertAuthBackendRole#ocsp_ca_certificates}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#ocsp_ca_certificates CertAuthBackendRole#ocsp_ca_certificates}
---
@@ -269,7 +269,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
If enabled, validate certificates' revocation status using OCSP.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#ocsp_enabled CertAuthBackendRole#ocsp_enabled}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#ocsp_enabled CertAuthBackendRole#ocsp_enabled}
---
@@ -279,7 +279,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
If true and an OCSP response cannot be fetched or is of an unknown status, the login will proceed as if the certificate has not been revoked.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#ocsp_fail_open CertAuthBackendRole#ocsp_fail_open}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#ocsp_fail_open CertAuthBackendRole#ocsp_fail_open}
---
@@ -289,7 +289,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
If set to true, rather than accepting the first successful OCSP response, query all servers and consider the certificate valid only if all servers agree.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#ocsp_query_all_servers CertAuthBackendRole#ocsp_query_all_servers}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#ocsp_query_all_servers CertAuthBackendRole#ocsp_query_all_servers}
---
@@ -301,7 +301,7 @@ A comma-separated list of OCSP server addresses.
If unset, the OCSP server is determined from the AuthorityInformationAccess extension on the certificate being inspected.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#ocsp_servers_override CertAuthBackendRole#ocsp_servers_override}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#ocsp_servers_override CertAuthBackendRole#ocsp_servers_override}
---
@@ -309,7 +309,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* typing.List[str]
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#required_extensions CertAuthBackendRole#required_extensions}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#required_extensions CertAuthBackendRole#required_extensions}.
---
@@ -319,7 +319,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Specifies the blocks of IP addresses which are allowed to use the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_bound_cidrs CertAuthBackendRole#token_bound_cidrs}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_bound_cidrs CertAuthBackendRole#token_bound_cidrs}
---
@@ -329,7 +329,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Generated Token's Explicit Maximum TTL in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_explicit_max_ttl CertAuthBackendRole#token_explicit_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_explicit_max_ttl CertAuthBackendRole#token_explicit_max_ttl}
---
@@ -339,7 +339,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The maximum lifetime of the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_max_ttl CertAuthBackendRole#token_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_max_ttl CertAuthBackendRole#token_max_ttl}
---
@@ -349,7 +349,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
If true, the 'default' policy will not automatically be added to generated tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_no_default_policy CertAuthBackendRole#token_no_default_policy}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_no_default_policy CertAuthBackendRole#token_no_default_policy}
---
@@ -359,7 +359,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The maximum number of times a token may be used, a value of zero means unlimited.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_num_uses CertAuthBackendRole#token_num_uses}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_num_uses CertAuthBackendRole#token_num_uses}
---
@@ -369,7 +369,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Generated Token's Period.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_period CertAuthBackendRole#token_period}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_period CertAuthBackendRole#token_period}
---
@@ -379,7 +379,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Generated Token's Policies.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_policies CertAuthBackendRole#token_policies}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_policies CertAuthBackendRole#token_policies}
---
@@ -389,7 +389,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The initial ttl of the token to generate in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_ttl CertAuthBackendRole#token_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_ttl CertAuthBackendRole#token_ttl}
---
@@ -399,7 +399,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The type of token to generate, service or batch.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_type CertAuthBackendRole#token_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_type CertAuthBackendRole#token_type}
---
@@ -1047,7 +1047,7 @@ The construct id used in the generated config for the CertAuthBackendRole to imp
The id of the existing CertAuthBackendRole that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#import import section} in the documentation of this resource for the id to use
---
@@ -1892,24 +1892,24 @@ certAuthBackendRole.CertAuthBackendRoleConfig(
| lifecycle
| cdktf.TerraformResourceLifecycle
| *No description.* |
| provider
| cdktf.TerraformProvider
| *No description.* |
| provisioners
| typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]]
| *No description.* |
-| certificate
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#certificate CertAuthBackendRole#certificate}. |
-| name
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#name CertAuthBackendRole#name}. |
-| allowed_common_names
| typing.List[str]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_common_names CertAuthBackendRole#allowed_common_names}. |
-| allowed_dns_sans
| typing.List[str]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_dns_sans CertAuthBackendRole#allowed_dns_sans}. |
-| allowed_email_sans
| typing.List[str]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_email_sans CertAuthBackendRole#allowed_email_sans}. |
-| allowed_names
| typing.List[str]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_names CertAuthBackendRole#allowed_names}. |
-| allowed_organizational_units
| typing.List[str]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_organizational_units CertAuthBackendRole#allowed_organizational_units}. |
-| allowed_uri_sans
| typing.List[str]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_uri_sans CertAuthBackendRole#allowed_uri_sans}. |
-| backend
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#backend CertAuthBackendRole#backend}. |
-| display_name
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#display_name CertAuthBackendRole#display_name}. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#id CertAuthBackendRole#id}. |
+| certificate
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#certificate CertAuthBackendRole#certificate}. |
+| name
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#name CertAuthBackendRole#name}. |
+| allowed_common_names
| typing.List[str]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_common_names CertAuthBackendRole#allowed_common_names}. |
+| allowed_dns_sans
| typing.List[str]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_dns_sans CertAuthBackendRole#allowed_dns_sans}. |
+| allowed_email_sans
| typing.List[str]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_email_sans CertAuthBackendRole#allowed_email_sans}. |
+| allowed_names
| typing.List[str]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_names CertAuthBackendRole#allowed_names}. |
+| allowed_organizational_units
| typing.List[str]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_organizational_units CertAuthBackendRole#allowed_organizational_units}. |
+| allowed_uri_sans
| typing.List[str]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_uri_sans CertAuthBackendRole#allowed_uri_sans}. |
+| backend
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#backend CertAuthBackendRole#backend}. |
+| display_name
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#display_name CertAuthBackendRole#display_name}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#id CertAuthBackendRole#id}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
| ocsp_ca_certificates
| str
| Any additional CA certificates needed to verify OCSP responses. Provided as base64 encoded PEM data. |
| ocsp_enabled
| typing.Union[bool, cdktf.IResolvable]
| If enabled, validate certificates' revocation status using OCSP. |
| ocsp_fail_open
| typing.Union[bool, cdktf.IResolvable]
| If true and an OCSP response cannot be fetched or is of an unknown status, the login will proceed as if the certificate has not been revoked. |
| ocsp_query_all_servers
| typing.Union[bool, cdktf.IResolvable]
| If set to true, rather than accepting the first successful OCSP response, query all servers and consider the certificate valid only if all servers agree. |
| ocsp_servers_override
| typing.List[str]
| A comma-separated list of OCSP server addresses. |
-| required_extensions
| typing.List[str]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#required_extensions CertAuthBackendRole#required_extensions}. |
+| required_extensions
| typing.List[str]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#required_extensions CertAuthBackendRole#required_extensions}. |
| token_bound_cidrs
| typing.List[str]
| Specifies the blocks of IP addresses which are allowed to use the generated token. |
| token_explicit_max_ttl
| typing.Union[int, float]
| Generated Token's Explicit Maximum TTL in seconds. |
| token_max_ttl
| typing.Union[int, float]
| The maximum lifetime of the generated token. |
@@ -2000,7 +2000,7 @@ certificate: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#certificate CertAuthBackendRole#certificate}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#certificate CertAuthBackendRole#certificate}.
---
@@ -2012,7 +2012,7 @@ name: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#name CertAuthBackendRole#name}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#name CertAuthBackendRole#name}.
---
@@ -2024,7 +2024,7 @@ allowed_common_names: typing.List[str]
- *Type:* typing.List[str]
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_common_names CertAuthBackendRole#allowed_common_names}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_common_names CertAuthBackendRole#allowed_common_names}.
---
@@ -2036,7 +2036,7 @@ allowed_dns_sans: typing.List[str]
- *Type:* typing.List[str]
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_dns_sans CertAuthBackendRole#allowed_dns_sans}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_dns_sans CertAuthBackendRole#allowed_dns_sans}.
---
@@ -2048,7 +2048,7 @@ allowed_email_sans: typing.List[str]
- *Type:* typing.List[str]
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_email_sans CertAuthBackendRole#allowed_email_sans}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_email_sans CertAuthBackendRole#allowed_email_sans}.
---
@@ -2060,7 +2060,7 @@ allowed_names: typing.List[str]
- *Type:* typing.List[str]
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_names CertAuthBackendRole#allowed_names}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_names CertAuthBackendRole#allowed_names}.
---
@@ -2072,7 +2072,7 @@ allowed_organizational_units: typing.List[str]
- *Type:* typing.List[str]
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_organizational_units CertAuthBackendRole#allowed_organizational_units}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_organizational_units CertAuthBackendRole#allowed_organizational_units}.
---
@@ -2084,7 +2084,7 @@ allowed_uri_sans: typing.List[str]
- *Type:* typing.List[str]
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_uri_sans CertAuthBackendRole#allowed_uri_sans}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_uri_sans CertAuthBackendRole#allowed_uri_sans}.
---
@@ -2096,7 +2096,7 @@ backend: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#backend CertAuthBackendRole#backend}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#backend CertAuthBackendRole#backend}.
---
@@ -2108,7 +2108,7 @@ display_name: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#display_name CertAuthBackendRole#display_name}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#display_name CertAuthBackendRole#display_name}.
---
@@ -2120,7 +2120,7 @@ id: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#id CertAuthBackendRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#id CertAuthBackendRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -2137,7 +2137,7 @@ namespace: str
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#namespace CertAuthBackendRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#namespace CertAuthBackendRole#namespace}
---
@@ -2151,7 +2151,7 @@ ocsp_ca_certificates: str
Any additional CA certificates needed to verify OCSP responses. Provided as base64 encoded PEM data.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#ocsp_ca_certificates CertAuthBackendRole#ocsp_ca_certificates}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#ocsp_ca_certificates CertAuthBackendRole#ocsp_ca_certificates}
---
@@ -2165,7 +2165,7 @@ ocsp_enabled: typing.Union[bool, IResolvable]
If enabled, validate certificates' revocation status using OCSP.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#ocsp_enabled CertAuthBackendRole#ocsp_enabled}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#ocsp_enabled CertAuthBackendRole#ocsp_enabled}
---
@@ -2179,7 +2179,7 @@ ocsp_fail_open: typing.Union[bool, IResolvable]
If true and an OCSP response cannot be fetched or is of an unknown status, the login will proceed as if the certificate has not been revoked.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#ocsp_fail_open CertAuthBackendRole#ocsp_fail_open}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#ocsp_fail_open CertAuthBackendRole#ocsp_fail_open}
---
@@ -2193,7 +2193,7 @@ ocsp_query_all_servers: typing.Union[bool, IResolvable]
If set to true, rather than accepting the first successful OCSP response, query all servers and consider the certificate valid only if all servers agree.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#ocsp_query_all_servers CertAuthBackendRole#ocsp_query_all_servers}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#ocsp_query_all_servers CertAuthBackendRole#ocsp_query_all_servers}
---
@@ -2209,7 +2209,7 @@ A comma-separated list of OCSP server addresses.
If unset, the OCSP server is determined from the AuthorityInformationAccess extension on the certificate being inspected.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#ocsp_servers_override CertAuthBackendRole#ocsp_servers_override}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#ocsp_servers_override CertAuthBackendRole#ocsp_servers_override}
---
@@ -2221,7 +2221,7 @@ required_extensions: typing.List[str]
- *Type:* typing.List[str]
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#required_extensions CertAuthBackendRole#required_extensions}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#required_extensions CertAuthBackendRole#required_extensions}.
---
@@ -2235,7 +2235,7 @@ token_bound_cidrs: typing.List[str]
Specifies the blocks of IP addresses which are allowed to use the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_bound_cidrs CertAuthBackendRole#token_bound_cidrs}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_bound_cidrs CertAuthBackendRole#token_bound_cidrs}
---
@@ -2249,7 +2249,7 @@ token_explicit_max_ttl: typing.Union[int, float]
Generated Token's Explicit Maximum TTL in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_explicit_max_ttl CertAuthBackendRole#token_explicit_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_explicit_max_ttl CertAuthBackendRole#token_explicit_max_ttl}
---
@@ -2263,7 +2263,7 @@ token_max_ttl: typing.Union[int, float]
The maximum lifetime of the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_max_ttl CertAuthBackendRole#token_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_max_ttl CertAuthBackendRole#token_max_ttl}
---
@@ -2277,7 +2277,7 @@ token_no_default_policy: typing.Union[bool, IResolvable]
If true, the 'default' policy will not automatically be added to generated tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_no_default_policy CertAuthBackendRole#token_no_default_policy}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_no_default_policy CertAuthBackendRole#token_no_default_policy}
---
@@ -2291,7 +2291,7 @@ token_num_uses: typing.Union[int, float]
The maximum number of times a token may be used, a value of zero means unlimited.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_num_uses CertAuthBackendRole#token_num_uses}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_num_uses CertAuthBackendRole#token_num_uses}
---
@@ -2305,7 +2305,7 @@ token_period: typing.Union[int, float]
Generated Token's Period.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_period CertAuthBackendRole#token_period}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_period CertAuthBackendRole#token_period}
---
@@ -2319,7 +2319,7 @@ token_policies: typing.List[str]
Generated Token's Policies.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_policies CertAuthBackendRole#token_policies}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_policies CertAuthBackendRole#token_policies}
---
@@ -2333,7 +2333,7 @@ token_ttl: typing.Union[int, float]
The initial ttl of the token to generate in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_ttl CertAuthBackendRole#token_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_ttl CertAuthBackendRole#token_ttl}
---
@@ -2347,7 +2347,7 @@ token_type: str
The type of token to generate, service or batch.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_type CertAuthBackendRole#token_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_type CertAuthBackendRole#token_type}
---
diff --git a/docs/certAuthBackendRole.typescript.md b/docs/certAuthBackendRole.typescript.md
index b67a3578..70f322d0 100644
--- a/docs/certAuthBackendRole.typescript.md
+++ b/docs/certAuthBackendRole.typescript.md
@@ -4,7 +4,7 @@
### CertAuthBackendRole
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role vault_cert_auth_backend_role}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role vault_cert_auth_backend_role}.
#### Initializers
@@ -642,7 +642,7 @@ The construct id used in the generated config for the CertAuthBackendRole to imp
The id of the existing CertAuthBackendRole that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#import import section} in the documentation of this resource for the id to use
---
@@ -1452,24 +1452,24 @@ const certAuthBackendRoleConfig: certAuthBackendRole.CertAuthBackendRoleConfig =
| lifecycle
| cdktf.TerraformResourceLifecycle
| *No description.* |
| provider
| cdktf.TerraformProvider
| *No description.* |
| provisioners
| cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[]
| *No description.* |
-| certificate
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#certificate CertAuthBackendRole#certificate}. |
-| name
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#name CertAuthBackendRole#name}. |
-| allowedCommonNames
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_common_names CertAuthBackendRole#allowed_common_names}. |
-| allowedDnsSans
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_dns_sans CertAuthBackendRole#allowed_dns_sans}. |
-| allowedEmailSans
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_email_sans CertAuthBackendRole#allowed_email_sans}. |
-| allowedNames
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_names CertAuthBackendRole#allowed_names}. |
-| allowedOrganizationalUnits
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_organizational_units CertAuthBackendRole#allowed_organizational_units}. |
-| allowedUriSans
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_uri_sans CertAuthBackendRole#allowed_uri_sans}. |
-| backend
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#backend CertAuthBackendRole#backend}. |
-| displayName
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#display_name CertAuthBackendRole#display_name}. |
-| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#id CertAuthBackendRole#id}. |
+| certificate
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#certificate CertAuthBackendRole#certificate}. |
+| name
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#name CertAuthBackendRole#name}. |
+| allowedCommonNames
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_common_names CertAuthBackendRole#allowed_common_names}. |
+| allowedDnsSans
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_dns_sans CertAuthBackendRole#allowed_dns_sans}. |
+| allowedEmailSans
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_email_sans CertAuthBackendRole#allowed_email_sans}. |
+| allowedNames
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_names CertAuthBackendRole#allowed_names}. |
+| allowedOrganizationalUnits
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_organizational_units CertAuthBackendRole#allowed_organizational_units}. |
+| allowedUriSans
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_uri_sans CertAuthBackendRole#allowed_uri_sans}. |
+| backend
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#backend CertAuthBackendRole#backend}. |
+| displayName
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#display_name CertAuthBackendRole#display_name}. |
+| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#id CertAuthBackendRole#id}. |
| namespace
| string
| Target namespace. (requires Enterprise). |
| ocspCaCertificates
| string
| Any additional CA certificates needed to verify OCSP responses. Provided as base64 encoded PEM data. |
| ocspEnabled
| boolean \| cdktf.IResolvable
| If enabled, validate certificates' revocation status using OCSP. |
| ocspFailOpen
| boolean \| cdktf.IResolvable
| If true and an OCSP response cannot be fetched or is of an unknown status, the login will proceed as if the certificate has not been revoked. |
| ocspQueryAllServers
| boolean \| cdktf.IResolvable
| If set to true, rather than accepting the first successful OCSP response, query all servers and consider the certificate valid only if all servers agree. |
| ocspServersOverride
| string[]
| A comma-separated list of OCSP server addresses. |
-| requiredExtensions
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#required_extensions CertAuthBackendRole#required_extensions}. |
+| requiredExtensions
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#required_extensions CertAuthBackendRole#required_extensions}. |
| tokenBoundCidrs
| string[]
| Specifies the blocks of IP addresses which are allowed to use the generated token. |
| tokenExplicitMaxTtl
| number
| Generated Token's Explicit Maximum TTL in seconds. |
| tokenMaxTtl
| number
| The maximum lifetime of the generated token. |
@@ -1560,7 +1560,7 @@ public readonly certificate: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#certificate CertAuthBackendRole#certificate}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#certificate CertAuthBackendRole#certificate}.
---
@@ -1572,7 +1572,7 @@ public readonly name: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#name CertAuthBackendRole#name}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#name CertAuthBackendRole#name}.
---
@@ -1584,7 +1584,7 @@ public readonly allowedCommonNames: string[];
- *Type:* string[]
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_common_names CertAuthBackendRole#allowed_common_names}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_common_names CertAuthBackendRole#allowed_common_names}.
---
@@ -1596,7 +1596,7 @@ public readonly allowedDnsSans: string[];
- *Type:* string[]
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_dns_sans CertAuthBackendRole#allowed_dns_sans}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_dns_sans CertAuthBackendRole#allowed_dns_sans}.
---
@@ -1608,7 +1608,7 @@ public readonly allowedEmailSans: string[];
- *Type:* string[]
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_email_sans CertAuthBackendRole#allowed_email_sans}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_email_sans CertAuthBackendRole#allowed_email_sans}.
---
@@ -1620,7 +1620,7 @@ public readonly allowedNames: string[];
- *Type:* string[]
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_names CertAuthBackendRole#allowed_names}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_names CertAuthBackendRole#allowed_names}.
---
@@ -1632,7 +1632,7 @@ public readonly allowedOrganizationalUnits: string[];
- *Type:* string[]
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_organizational_units CertAuthBackendRole#allowed_organizational_units}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_organizational_units CertAuthBackendRole#allowed_organizational_units}.
---
@@ -1644,7 +1644,7 @@ public readonly allowedUriSans: string[];
- *Type:* string[]
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_uri_sans CertAuthBackendRole#allowed_uri_sans}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_uri_sans CertAuthBackendRole#allowed_uri_sans}.
---
@@ -1656,7 +1656,7 @@ public readonly backend: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#backend CertAuthBackendRole#backend}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#backend CertAuthBackendRole#backend}.
---
@@ -1668,7 +1668,7 @@ public readonly displayName: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#display_name CertAuthBackendRole#display_name}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#display_name CertAuthBackendRole#display_name}.
---
@@ -1680,7 +1680,7 @@ public readonly id: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#id CertAuthBackendRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#id CertAuthBackendRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1697,7 +1697,7 @@ public readonly namespace: string;
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#namespace CertAuthBackendRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#namespace CertAuthBackendRole#namespace}
---
@@ -1711,7 +1711,7 @@ public readonly ocspCaCertificates: string;
Any additional CA certificates needed to verify OCSP responses. Provided as base64 encoded PEM data.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#ocsp_ca_certificates CertAuthBackendRole#ocsp_ca_certificates}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#ocsp_ca_certificates CertAuthBackendRole#ocsp_ca_certificates}
---
@@ -1725,7 +1725,7 @@ public readonly ocspEnabled: boolean | IResolvable;
If enabled, validate certificates' revocation status using OCSP.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#ocsp_enabled CertAuthBackendRole#ocsp_enabled}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#ocsp_enabled CertAuthBackendRole#ocsp_enabled}
---
@@ -1739,7 +1739,7 @@ public readonly ocspFailOpen: boolean | IResolvable;
If true and an OCSP response cannot be fetched or is of an unknown status, the login will proceed as if the certificate has not been revoked.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#ocsp_fail_open CertAuthBackendRole#ocsp_fail_open}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#ocsp_fail_open CertAuthBackendRole#ocsp_fail_open}
---
@@ -1753,7 +1753,7 @@ public readonly ocspQueryAllServers: boolean | IResolvable;
If set to true, rather than accepting the first successful OCSP response, query all servers and consider the certificate valid only if all servers agree.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#ocsp_query_all_servers CertAuthBackendRole#ocsp_query_all_servers}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#ocsp_query_all_servers CertAuthBackendRole#ocsp_query_all_servers}
---
@@ -1769,7 +1769,7 @@ A comma-separated list of OCSP server addresses.
If unset, the OCSP server is determined from the AuthorityInformationAccess extension on the certificate being inspected.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#ocsp_servers_override CertAuthBackendRole#ocsp_servers_override}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#ocsp_servers_override CertAuthBackendRole#ocsp_servers_override}
---
@@ -1781,7 +1781,7 @@ public readonly requiredExtensions: string[];
- *Type:* string[]
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#required_extensions CertAuthBackendRole#required_extensions}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#required_extensions CertAuthBackendRole#required_extensions}.
---
@@ -1795,7 +1795,7 @@ public readonly tokenBoundCidrs: string[];
Specifies the blocks of IP addresses which are allowed to use the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_bound_cidrs CertAuthBackendRole#token_bound_cidrs}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_bound_cidrs CertAuthBackendRole#token_bound_cidrs}
---
@@ -1809,7 +1809,7 @@ public readonly tokenExplicitMaxTtl: number;
Generated Token's Explicit Maximum TTL in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_explicit_max_ttl CertAuthBackendRole#token_explicit_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_explicit_max_ttl CertAuthBackendRole#token_explicit_max_ttl}
---
@@ -1823,7 +1823,7 @@ public readonly tokenMaxTtl: number;
The maximum lifetime of the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_max_ttl CertAuthBackendRole#token_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_max_ttl CertAuthBackendRole#token_max_ttl}
---
@@ -1837,7 +1837,7 @@ public readonly tokenNoDefaultPolicy: boolean | IResolvable;
If true, the 'default' policy will not automatically be added to generated tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_no_default_policy CertAuthBackendRole#token_no_default_policy}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_no_default_policy CertAuthBackendRole#token_no_default_policy}
---
@@ -1851,7 +1851,7 @@ public readonly tokenNumUses: number;
The maximum number of times a token may be used, a value of zero means unlimited.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_num_uses CertAuthBackendRole#token_num_uses}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_num_uses CertAuthBackendRole#token_num_uses}
---
@@ -1865,7 +1865,7 @@ public readonly tokenPeriod: number;
Generated Token's Period.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_period CertAuthBackendRole#token_period}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_period CertAuthBackendRole#token_period}
---
@@ -1879,7 +1879,7 @@ public readonly tokenPolicies: string[];
Generated Token's Policies.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_policies CertAuthBackendRole#token_policies}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_policies CertAuthBackendRole#token_policies}
---
@@ -1893,7 +1893,7 @@ public readonly tokenTtl: number;
The initial ttl of the token to generate in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_ttl CertAuthBackendRole#token_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_ttl CertAuthBackendRole#token_ttl}
---
@@ -1907,7 +1907,7 @@ public readonly tokenType: string;
The type of token to generate, service or batch.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_type CertAuthBackendRole#token_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_type CertAuthBackendRole#token_type}
---
diff --git a/docs/configUiCustomMessage.csharp.md b/docs/configUiCustomMessage.csharp.md
index e31f766a..b4b2b45a 100644
--- a/docs/configUiCustomMessage.csharp.md
+++ b/docs/configUiCustomMessage.csharp.md
@@ -4,7 +4,7 @@
### ConfigUiCustomMessage
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message vault_config_ui_custom_message}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message vault_config_ui_custom_message}.
#### Initializers
@@ -522,7 +522,7 @@ The construct id used in the generated config for the ConfigUiCustomMessage to i
The id of the existing ConfigUiCustomMessage that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#import import section} in the documentation of this resource for the id to use
---
@@ -1056,7 +1056,7 @@ public string MessageBase64 { get; set; }
The base64-encoded content of the custom message.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#message_base64 ConfigUiCustomMessage#message_base64}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#message_base64 ConfigUiCustomMessage#message_base64}
---
@@ -1070,7 +1070,7 @@ public string StartTime { get; set; }
The starting time of the active period of the custom message.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#start_time ConfigUiCustomMessage#start_time}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#start_time ConfigUiCustomMessage#start_time}
---
@@ -1084,7 +1084,7 @@ public string Title { get; set; }
The title of the custom message.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#title ConfigUiCustomMessage#title}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#title ConfigUiCustomMessage#title}
---
@@ -1098,7 +1098,7 @@ public object Authenticated { get; set; }
A flag indicating whether the custom message is displayed pre-login (false) or post-login (true).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#authenticated ConfigUiCustomMessage#authenticated}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#authenticated ConfigUiCustomMessage#authenticated}
---
@@ -1112,7 +1112,7 @@ public string EndTime { get; set; }
The ending time of the active period of the custom message. Can be omitted for non-expiring message.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#end_time ConfigUiCustomMessage#end_time}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#end_time ConfigUiCustomMessage#end_time}
---
@@ -1126,7 +1126,7 @@ public ConfigUiCustomMessageLink Link { get; set; }
link block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#link ConfigUiCustomMessage#link}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#link ConfigUiCustomMessage#link}
---
@@ -1140,7 +1140,7 @@ public string Namespace { get; set; }
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#namespace ConfigUiCustomMessage#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#namespace ConfigUiCustomMessage#namespace}
---
@@ -1154,7 +1154,7 @@ public System.Collections.Generic.IDictionary Options { get; set
A map containing additional options for the custom message.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#options ConfigUiCustomMessage#options}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#options ConfigUiCustomMessage#options}
---
@@ -1168,7 +1168,7 @@ public string Type { get; set; }
The display type of custom message. Allowed values are banner and modal.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#type ConfigUiCustomMessage#type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#type ConfigUiCustomMessage#type}
---
@@ -1204,7 +1204,7 @@ public string Href { get; set; }
The URL of the hyperlink.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#href ConfigUiCustomMessage#href}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#href ConfigUiCustomMessage#href}
---
@@ -1218,7 +1218,7 @@ public string Title { get; set; }
The title of the hyperlink.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#title ConfigUiCustomMessage#title}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#title ConfigUiCustomMessage#title}
---
diff --git a/docs/configUiCustomMessage.go.md b/docs/configUiCustomMessage.go.md
index ec797ee0..77a6dc25 100644
--- a/docs/configUiCustomMessage.go.md
+++ b/docs/configUiCustomMessage.go.md
@@ -4,7 +4,7 @@
### ConfigUiCustomMessage
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message vault_config_ui_custom_message}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message vault_config_ui_custom_message}.
#### Initializers
@@ -522,7 +522,7 @@ The construct id used in the generated config for the ConfigUiCustomMessage to i
The id of the existing ConfigUiCustomMessage that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#import import section} in the documentation of this resource for the id to use
---
@@ -1056,7 +1056,7 @@ MessageBase64 *string
The base64-encoded content of the custom message.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#message_base64 ConfigUiCustomMessage#message_base64}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#message_base64 ConfigUiCustomMessage#message_base64}
---
@@ -1070,7 +1070,7 @@ StartTime *string
The starting time of the active period of the custom message.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#start_time ConfigUiCustomMessage#start_time}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#start_time ConfigUiCustomMessage#start_time}
---
@@ -1084,7 +1084,7 @@ Title *string
The title of the custom message.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#title ConfigUiCustomMessage#title}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#title ConfigUiCustomMessage#title}
---
@@ -1098,7 +1098,7 @@ Authenticated interface{}
A flag indicating whether the custom message is displayed pre-login (false) or post-login (true).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#authenticated ConfigUiCustomMessage#authenticated}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#authenticated ConfigUiCustomMessage#authenticated}
---
@@ -1112,7 +1112,7 @@ EndTime *string
The ending time of the active period of the custom message. Can be omitted for non-expiring message.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#end_time ConfigUiCustomMessage#end_time}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#end_time ConfigUiCustomMessage#end_time}
---
@@ -1126,7 +1126,7 @@ Link ConfigUiCustomMessageLink
link block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#link ConfigUiCustomMessage#link}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#link ConfigUiCustomMessage#link}
---
@@ -1140,7 +1140,7 @@ Namespace *string
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#namespace ConfigUiCustomMessage#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#namespace ConfigUiCustomMessage#namespace}
---
@@ -1154,7 +1154,7 @@ Options *map[string]*string
A map containing additional options for the custom message.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#options ConfigUiCustomMessage#options}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#options ConfigUiCustomMessage#options}
---
@@ -1168,7 +1168,7 @@ Type *string
The display type of custom message. Allowed values are banner and modal.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#type ConfigUiCustomMessage#type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#type ConfigUiCustomMessage#type}
---
@@ -1204,7 +1204,7 @@ Href *string
The URL of the hyperlink.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#href ConfigUiCustomMessage#href}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#href ConfigUiCustomMessage#href}
---
@@ -1218,7 +1218,7 @@ Title *string
The title of the hyperlink.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#title ConfigUiCustomMessage#title}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#title ConfigUiCustomMessage#title}
---
diff --git a/docs/configUiCustomMessage.java.md b/docs/configUiCustomMessage.java.md
index 20a12a54..20c63179 100644
--- a/docs/configUiCustomMessage.java.md
+++ b/docs/configUiCustomMessage.java.md
@@ -4,7 +4,7 @@
### ConfigUiCustomMessage
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message vault_config_ui_custom_message}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message vault_config_ui_custom_message}.
#### Initializers
@@ -125,7 +125,7 @@ Must be unique amongst siblings in the same scope
The base64-encoded content of the custom message.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#message_base64 ConfigUiCustomMessage#message_base64}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#message_base64 ConfigUiCustomMessage#message_base64}
---
@@ -135,7 +135,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The starting time of the active period of the custom message.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#start_time ConfigUiCustomMessage#start_time}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#start_time ConfigUiCustomMessage#start_time}
---
@@ -145,7 +145,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The title of the custom message.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#title ConfigUiCustomMessage#title}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#title ConfigUiCustomMessage#title}
---
@@ -155,7 +155,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
A flag indicating whether the custom message is displayed pre-login (false) or post-login (true).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#authenticated ConfigUiCustomMessage#authenticated}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#authenticated ConfigUiCustomMessage#authenticated}
---
@@ -165,7 +165,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The ending time of the active period of the custom message. Can be omitted for non-expiring message.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#end_time ConfigUiCustomMessage#end_time}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#end_time ConfigUiCustomMessage#end_time}
---
@@ -175,7 +175,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
link block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#link ConfigUiCustomMessage#link}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#link ConfigUiCustomMessage#link}
---
@@ -185,7 +185,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#namespace ConfigUiCustomMessage#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#namespace ConfigUiCustomMessage#namespace}
---
@@ -195,7 +195,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
A map containing additional options for the custom message.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#options ConfigUiCustomMessage#options}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#options ConfigUiCustomMessage#options}
---
@@ -205,7 +205,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The display type of custom message. Allowed values are banner and modal.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#type ConfigUiCustomMessage#type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#type ConfigUiCustomMessage#type}
---
@@ -687,7 +687,7 @@ The construct id used in the generated config for the ConfigUiCustomMessage to i
The id of the existing ConfigUiCustomMessage that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#import import section} in the documentation of this resource for the id to use
---
@@ -1226,7 +1226,7 @@ public java.lang.String getMessageBase64();
The base64-encoded content of the custom message.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#message_base64 ConfigUiCustomMessage#message_base64}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#message_base64 ConfigUiCustomMessage#message_base64}
---
@@ -1240,7 +1240,7 @@ public java.lang.String getStartTime();
The starting time of the active period of the custom message.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#start_time ConfigUiCustomMessage#start_time}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#start_time ConfigUiCustomMessage#start_time}
---
@@ -1254,7 +1254,7 @@ public java.lang.String getTitle();
The title of the custom message.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#title ConfigUiCustomMessage#title}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#title ConfigUiCustomMessage#title}
---
@@ -1268,7 +1268,7 @@ public java.lang.Object getAuthenticated();
A flag indicating whether the custom message is displayed pre-login (false) or post-login (true).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#authenticated ConfigUiCustomMessage#authenticated}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#authenticated ConfigUiCustomMessage#authenticated}
---
@@ -1282,7 +1282,7 @@ public java.lang.String getEndTime();
The ending time of the active period of the custom message. Can be omitted for non-expiring message.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#end_time ConfigUiCustomMessage#end_time}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#end_time ConfigUiCustomMessage#end_time}
---
@@ -1296,7 +1296,7 @@ public ConfigUiCustomMessageLink getLink();
link block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#link ConfigUiCustomMessage#link}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#link ConfigUiCustomMessage#link}
---
@@ -1310,7 +1310,7 @@ public java.lang.String getNamespace();
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#namespace ConfigUiCustomMessage#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#namespace ConfigUiCustomMessage#namespace}
---
@@ -1324,7 +1324,7 @@ public java.util.Map getOptions();
A map containing additional options for the custom message.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#options ConfigUiCustomMessage#options}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#options ConfigUiCustomMessage#options}
---
@@ -1338,7 +1338,7 @@ public java.lang.String getType();
The display type of custom message. Allowed values are banner and modal.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#type ConfigUiCustomMessage#type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#type ConfigUiCustomMessage#type}
---
@@ -1374,7 +1374,7 @@ public java.lang.String getHref();
The URL of the hyperlink.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#href ConfigUiCustomMessage#href}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#href ConfigUiCustomMessage#href}
---
@@ -1388,7 +1388,7 @@ public java.lang.String getTitle();
The title of the hyperlink.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#title ConfigUiCustomMessage#title}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#title ConfigUiCustomMessage#title}
---
diff --git a/docs/configUiCustomMessage.python.md b/docs/configUiCustomMessage.python.md
index f62f695d..4892e98f 100644
--- a/docs/configUiCustomMessage.python.md
+++ b/docs/configUiCustomMessage.python.md
@@ -4,7 +4,7 @@
### ConfigUiCustomMessage
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message vault_config_ui_custom_message}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message vault_config_ui_custom_message}.
#### Initializers
@@ -122,7 +122,7 @@ Must be unique amongst siblings in the same scope
The base64-encoded content of the custom message.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#message_base64 ConfigUiCustomMessage#message_base64}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#message_base64 ConfigUiCustomMessage#message_base64}
---
@@ -132,7 +132,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The starting time of the active period of the custom message.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#start_time ConfigUiCustomMessage#start_time}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#start_time ConfigUiCustomMessage#start_time}
---
@@ -142,7 +142,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The title of the custom message.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#title ConfigUiCustomMessage#title}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#title ConfigUiCustomMessage#title}
---
@@ -152,7 +152,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
A flag indicating whether the custom message is displayed pre-login (false) or post-login (true).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#authenticated ConfigUiCustomMessage#authenticated}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#authenticated ConfigUiCustomMessage#authenticated}
---
@@ -162,7 +162,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The ending time of the active period of the custom message. Can be omitted for non-expiring message.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#end_time ConfigUiCustomMessage#end_time}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#end_time ConfigUiCustomMessage#end_time}
---
@@ -172,7 +172,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
link block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#link ConfigUiCustomMessage#link}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#link ConfigUiCustomMessage#link}
---
@@ -182,7 +182,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#namespace ConfigUiCustomMessage#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#namespace ConfigUiCustomMessage#namespace}
---
@@ -192,7 +192,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
A map containing additional options for the custom message.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#options ConfigUiCustomMessage#options}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#options ConfigUiCustomMessage#options}
---
@@ -202,7 +202,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The display type of custom message. Allowed values are banner and modal.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#type ConfigUiCustomMessage#type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#type ConfigUiCustomMessage#type}
---
@@ -583,7 +583,7 @@ def put_link(
The URL of the hyperlink.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#href ConfigUiCustomMessage#href}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#href ConfigUiCustomMessage#href}
---
@@ -593,7 +593,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The title of the hyperlink.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#title ConfigUiCustomMessage#title}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#title ConfigUiCustomMessage#title}
---
@@ -747,7 +747,7 @@ The construct id used in the generated config for the ConfigUiCustomMessage to i
The id of the existing ConfigUiCustomMessage that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#import import section} in the documentation of this resource for the id to use
---
@@ -1281,7 +1281,7 @@ message_base64: str
The base64-encoded content of the custom message.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#message_base64 ConfigUiCustomMessage#message_base64}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#message_base64 ConfigUiCustomMessage#message_base64}
---
@@ -1295,7 +1295,7 @@ start_time: str
The starting time of the active period of the custom message.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#start_time ConfigUiCustomMessage#start_time}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#start_time ConfigUiCustomMessage#start_time}
---
@@ -1309,7 +1309,7 @@ title: str
The title of the custom message.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#title ConfigUiCustomMessage#title}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#title ConfigUiCustomMessage#title}
---
@@ -1323,7 +1323,7 @@ authenticated: typing.Union[bool, IResolvable]
A flag indicating whether the custom message is displayed pre-login (false) or post-login (true).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#authenticated ConfigUiCustomMessage#authenticated}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#authenticated ConfigUiCustomMessage#authenticated}
---
@@ -1337,7 +1337,7 @@ end_time: str
The ending time of the active period of the custom message. Can be omitted for non-expiring message.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#end_time ConfigUiCustomMessage#end_time}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#end_time ConfigUiCustomMessage#end_time}
---
@@ -1351,7 +1351,7 @@ link: ConfigUiCustomMessageLink
link block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#link ConfigUiCustomMessage#link}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#link ConfigUiCustomMessage#link}
---
@@ -1365,7 +1365,7 @@ namespace: str
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#namespace ConfigUiCustomMessage#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#namespace ConfigUiCustomMessage#namespace}
---
@@ -1379,7 +1379,7 @@ options: typing.Mapping[str]
A map containing additional options for the custom message.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#options ConfigUiCustomMessage#options}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#options ConfigUiCustomMessage#options}
---
@@ -1393,7 +1393,7 @@ type: str
The display type of custom message. Allowed values are banner and modal.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#type ConfigUiCustomMessage#type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#type ConfigUiCustomMessage#type}
---
@@ -1429,7 +1429,7 @@ href: str
The URL of the hyperlink.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#href ConfigUiCustomMessage#href}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#href ConfigUiCustomMessage#href}
---
@@ -1443,7 +1443,7 @@ title: str
The title of the hyperlink.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#title ConfigUiCustomMessage#title}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#title ConfigUiCustomMessage#title}
---
diff --git a/docs/configUiCustomMessage.typescript.md b/docs/configUiCustomMessage.typescript.md
index 2db9ea6d..fe123c9d 100644
--- a/docs/configUiCustomMessage.typescript.md
+++ b/docs/configUiCustomMessage.typescript.md
@@ -4,7 +4,7 @@
### ConfigUiCustomMessage
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message vault_config_ui_custom_message}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message vault_config_ui_custom_message}.
#### Initializers
@@ -522,7 +522,7 @@ The construct id used in the generated config for the ConfigUiCustomMessage to i
The id of the existing ConfigUiCustomMessage that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#import import section} in the documentation of this resource for the id to use
---
@@ -1039,7 +1039,7 @@ public readonly messageBase64: string;
The base64-encoded content of the custom message.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#message_base64 ConfigUiCustomMessage#message_base64}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#message_base64 ConfigUiCustomMessage#message_base64}
---
@@ -1053,7 +1053,7 @@ public readonly startTime: string;
The starting time of the active period of the custom message.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#start_time ConfigUiCustomMessage#start_time}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#start_time ConfigUiCustomMessage#start_time}
---
@@ -1067,7 +1067,7 @@ public readonly title: string;
The title of the custom message.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#title ConfigUiCustomMessage#title}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#title ConfigUiCustomMessage#title}
---
@@ -1081,7 +1081,7 @@ public readonly authenticated: boolean | IResolvable;
A flag indicating whether the custom message is displayed pre-login (false) or post-login (true).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#authenticated ConfigUiCustomMessage#authenticated}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#authenticated ConfigUiCustomMessage#authenticated}
---
@@ -1095,7 +1095,7 @@ public readonly endTime: string;
The ending time of the active period of the custom message. Can be omitted for non-expiring message.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#end_time ConfigUiCustomMessage#end_time}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#end_time ConfigUiCustomMessage#end_time}
---
@@ -1109,7 +1109,7 @@ public readonly link: ConfigUiCustomMessageLink;
link block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#link ConfigUiCustomMessage#link}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#link ConfigUiCustomMessage#link}
---
@@ -1123,7 +1123,7 @@ public readonly namespace: string;
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#namespace ConfigUiCustomMessage#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#namespace ConfigUiCustomMessage#namespace}
---
@@ -1137,7 +1137,7 @@ public readonly options: {[ key: string ]: string};
A map containing additional options for the custom message.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#options ConfigUiCustomMessage#options}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#options ConfigUiCustomMessage#options}
---
@@ -1151,7 +1151,7 @@ public readonly type: string;
The display type of custom message. Allowed values are banner and modal.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#type ConfigUiCustomMessage#type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#type ConfigUiCustomMessage#type}
---
@@ -1184,7 +1184,7 @@ public readonly href: string;
The URL of the hyperlink.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#href ConfigUiCustomMessage#href}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#href ConfigUiCustomMessage#href}
---
@@ -1198,7 +1198,7 @@ public readonly title: string;
The title of the hyperlink.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#title ConfigUiCustomMessage#title}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#title ConfigUiCustomMessage#title}
---
diff --git a/docs/consulSecretBackend.csharp.md b/docs/consulSecretBackend.csharp.md
index e06ae3a4..0343c796 100644
--- a/docs/consulSecretBackend.csharp.md
+++ b/docs/consulSecretBackend.csharp.md
@@ -4,7 +4,7 @@
### ConsulSecretBackend
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend vault_consul_secret_backend}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend vault_consul_secret_backend}.
#### Initializers
@@ -565,7 +565,7 @@ The construct id used in the generated config for the ConsulSecretBackend to imp
The id of the existing ConsulSecretBackend that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#import import section} in the documentation of this resource for the id to use
---
@@ -1142,7 +1142,7 @@ new ConsulSecretBackendConfig {
| DefaultLeaseTtlSeconds
| double
| Default lease duration for secrets in seconds. |
| Description
| string
| Human-friendly description of the mount for the backend. |
| DisableRemount
| object
| If set, opts out of mount migration on path updates. |
-| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#id ConsulSecretBackend#id}. |
+| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#id ConsulSecretBackend#id}. |
| Local
| object
| Specifies if the secret backend is local only. |
| MaxLeaseTtlSeconds
| double
| Maximum possible lease duration for secrets in seconds. |
| Namespace
| string
| Target namespace. (requires Enterprise). |
@@ -1232,7 +1232,7 @@ public string Address { get; set; }
Specifies the address of the Consul instance, provided as "host:port" like "127.0.0.1:8500".
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#address ConsulSecretBackend#address}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#address ConsulSecretBackend#address}
---
@@ -1248,7 +1248,7 @@ Denotes a backend resource that is used to bootstrap the Consul ACL system.
Only one resource may be used to bootstrap.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#bootstrap ConsulSecretBackend#bootstrap}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#bootstrap ConsulSecretBackend#bootstrap}
---
@@ -1262,7 +1262,7 @@ public string CaCert { get; set; }
CA certificate to use when verifying Consul server certificate, must be x509 PEM encoded.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#ca_cert ConsulSecretBackend#ca_cert}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#ca_cert ConsulSecretBackend#ca_cert}
---
@@ -1276,7 +1276,7 @@ public string ClientCert { get; set; }
Client certificate used for Consul's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_key.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#client_cert ConsulSecretBackend#client_cert}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#client_cert ConsulSecretBackend#client_cert}
---
@@ -1290,7 +1290,7 @@ public string ClientKey { get; set; }
Client key used for Consul's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_cert.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#client_key ConsulSecretBackend#client_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#client_key ConsulSecretBackend#client_key}
---
@@ -1304,7 +1304,7 @@ public double DefaultLeaseTtlSeconds { get; set; }
Default lease duration for secrets in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#default_lease_ttl_seconds ConsulSecretBackend#default_lease_ttl_seconds}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#default_lease_ttl_seconds ConsulSecretBackend#default_lease_ttl_seconds}
---
@@ -1318,7 +1318,7 @@ public string Description { get; set; }
Human-friendly description of the mount for the backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#description ConsulSecretBackend#description}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#description ConsulSecretBackend#description}
---
@@ -1332,7 +1332,7 @@ public object DisableRemount { get; set; }
If set, opts out of mount migration on path updates.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#disable_remount ConsulSecretBackend#disable_remount}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#disable_remount ConsulSecretBackend#disable_remount}
---
@@ -1344,7 +1344,7 @@ public string Id { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#id ConsulSecretBackend#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#id ConsulSecretBackend#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1361,7 +1361,7 @@ public object Local { get; set; }
Specifies if the secret backend is local only.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#local ConsulSecretBackend#local}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#local ConsulSecretBackend#local}
---
@@ -1375,7 +1375,7 @@ public double MaxLeaseTtlSeconds { get; set; }
Maximum possible lease duration for secrets in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#max_lease_ttl_seconds ConsulSecretBackend#max_lease_ttl_seconds}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#max_lease_ttl_seconds ConsulSecretBackend#max_lease_ttl_seconds}
---
@@ -1389,7 +1389,7 @@ public string Namespace { get; set; }
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#namespace ConsulSecretBackend#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#namespace ConsulSecretBackend#namespace}
---
@@ -1403,7 +1403,7 @@ public string Path { get; set; }
Unique name of the Vault Consul mount to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#path ConsulSecretBackend#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#path ConsulSecretBackend#path}
---
@@ -1417,7 +1417,7 @@ public string Scheme { get; set; }
Specifies the URL scheme to use. Defaults to "http".
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#scheme ConsulSecretBackend#scheme}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#scheme ConsulSecretBackend#scheme}
---
@@ -1431,7 +1431,7 @@ public string Token { get; set; }
Specifies the Consul token to use when managing or issuing new tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#token ConsulSecretBackend#token}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#token ConsulSecretBackend#token}
---
diff --git a/docs/consulSecretBackend.go.md b/docs/consulSecretBackend.go.md
index 3e86b456..05529adc 100644
--- a/docs/consulSecretBackend.go.md
+++ b/docs/consulSecretBackend.go.md
@@ -4,7 +4,7 @@
### ConsulSecretBackend
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend vault_consul_secret_backend}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend vault_consul_secret_backend}.
#### Initializers
@@ -565,7 +565,7 @@ The construct id used in the generated config for the ConsulSecretBackend to imp
The id of the existing ConsulSecretBackend that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#import import section} in the documentation of this resource for the id to use
---
@@ -1142,7 +1142,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/consulsecretbackend"
| DefaultLeaseTtlSeconds
| *f64
| Default lease duration for secrets in seconds. |
| Description
| *string
| Human-friendly description of the mount for the backend. |
| DisableRemount
| interface{}
| If set, opts out of mount migration on path updates. |
-| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#id ConsulSecretBackend#id}. |
+| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#id ConsulSecretBackend#id}. |
| Local
| interface{}
| Specifies if the secret backend is local only. |
| MaxLeaseTtlSeconds
| *f64
| Maximum possible lease duration for secrets in seconds. |
| Namespace
| *string
| Target namespace. (requires Enterprise). |
@@ -1232,7 +1232,7 @@ Address *string
Specifies the address of the Consul instance, provided as "host:port" like "127.0.0.1:8500".
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#address ConsulSecretBackend#address}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#address ConsulSecretBackend#address}
---
@@ -1248,7 +1248,7 @@ Denotes a backend resource that is used to bootstrap the Consul ACL system.
Only one resource may be used to bootstrap.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#bootstrap ConsulSecretBackend#bootstrap}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#bootstrap ConsulSecretBackend#bootstrap}
---
@@ -1262,7 +1262,7 @@ CaCert *string
CA certificate to use when verifying Consul server certificate, must be x509 PEM encoded.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#ca_cert ConsulSecretBackend#ca_cert}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#ca_cert ConsulSecretBackend#ca_cert}
---
@@ -1276,7 +1276,7 @@ ClientCert *string
Client certificate used for Consul's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_key.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#client_cert ConsulSecretBackend#client_cert}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#client_cert ConsulSecretBackend#client_cert}
---
@@ -1290,7 +1290,7 @@ ClientKey *string
Client key used for Consul's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_cert.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#client_key ConsulSecretBackend#client_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#client_key ConsulSecretBackend#client_key}
---
@@ -1304,7 +1304,7 @@ DefaultLeaseTtlSeconds *f64
Default lease duration for secrets in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#default_lease_ttl_seconds ConsulSecretBackend#default_lease_ttl_seconds}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#default_lease_ttl_seconds ConsulSecretBackend#default_lease_ttl_seconds}
---
@@ -1318,7 +1318,7 @@ Description *string
Human-friendly description of the mount for the backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#description ConsulSecretBackend#description}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#description ConsulSecretBackend#description}
---
@@ -1332,7 +1332,7 @@ DisableRemount interface{}
If set, opts out of mount migration on path updates.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#disable_remount ConsulSecretBackend#disable_remount}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#disable_remount ConsulSecretBackend#disable_remount}
---
@@ -1344,7 +1344,7 @@ Id *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#id ConsulSecretBackend#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#id ConsulSecretBackend#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1361,7 +1361,7 @@ Local interface{}
Specifies if the secret backend is local only.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#local ConsulSecretBackend#local}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#local ConsulSecretBackend#local}
---
@@ -1375,7 +1375,7 @@ MaxLeaseTtlSeconds *f64
Maximum possible lease duration for secrets in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#max_lease_ttl_seconds ConsulSecretBackend#max_lease_ttl_seconds}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#max_lease_ttl_seconds ConsulSecretBackend#max_lease_ttl_seconds}
---
@@ -1389,7 +1389,7 @@ Namespace *string
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#namespace ConsulSecretBackend#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#namespace ConsulSecretBackend#namespace}
---
@@ -1403,7 +1403,7 @@ Path *string
Unique name of the Vault Consul mount to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#path ConsulSecretBackend#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#path ConsulSecretBackend#path}
---
@@ -1417,7 +1417,7 @@ Scheme *string
Specifies the URL scheme to use. Defaults to "http".
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#scheme ConsulSecretBackend#scheme}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#scheme ConsulSecretBackend#scheme}
---
@@ -1431,7 +1431,7 @@ Token *string
Specifies the Consul token to use when managing or issuing new tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#token ConsulSecretBackend#token}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#token ConsulSecretBackend#token}
---
diff --git a/docs/consulSecretBackend.java.md b/docs/consulSecretBackend.java.md
index b9171863..64e27822 100644
--- a/docs/consulSecretBackend.java.md
+++ b/docs/consulSecretBackend.java.md
@@ -4,7 +4,7 @@
### ConsulSecretBackend
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend vault_consul_secret_backend}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend vault_consul_secret_backend}.
#### Initializers
@@ -63,7 +63,7 @@ ConsulSecretBackend.Builder.create(Construct scope, java.lang.String id)
| defaultLeaseTtlSeconds
| java.lang.Number
| Default lease duration for secrets in seconds. |
| description
| java.lang.String
| Human-friendly description of the mount for the backend. |
| disableRemount
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| If set, opts out of mount migration on path updates. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#id ConsulSecretBackend#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#id ConsulSecretBackend#id}. |
| local
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| Specifies if the secret backend is local only. |
| maxLeaseTtlSeconds
| java.lang.Number
| Maximum possible lease duration for secrets in seconds. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
@@ -139,7 +139,7 @@ Must be unique amongst siblings in the same scope
Specifies the address of the Consul instance, provided as "host:port" like "127.0.0.1:8500".
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#address ConsulSecretBackend#address}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#address ConsulSecretBackend#address}
---
@@ -151,7 +151,7 @@ Denotes a backend resource that is used to bootstrap the Consul ACL system.
Only one resource may be used to bootstrap.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#bootstrap ConsulSecretBackend#bootstrap}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#bootstrap ConsulSecretBackend#bootstrap}
---
@@ -161,7 +161,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
CA certificate to use when verifying Consul server certificate, must be x509 PEM encoded.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#ca_cert ConsulSecretBackend#ca_cert}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#ca_cert ConsulSecretBackend#ca_cert}
---
@@ -171,7 +171,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Client certificate used for Consul's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_key.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#client_cert ConsulSecretBackend#client_cert}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#client_cert ConsulSecretBackend#client_cert}
---
@@ -181,7 +181,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Client key used for Consul's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_cert.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#client_key ConsulSecretBackend#client_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#client_key ConsulSecretBackend#client_key}
---
@@ -191,7 +191,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Default lease duration for secrets in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#default_lease_ttl_seconds ConsulSecretBackend#default_lease_ttl_seconds}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#default_lease_ttl_seconds ConsulSecretBackend#default_lease_ttl_seconds}
---
@@ -201,7 +201,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Human-friendly description of the mount for the backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#description ConsulSecretBackend#description}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#description ConsulSecretBackend#description}
---
@@ -211,7 +211,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
If set, opts out of mount migration on path updates.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#disable_remount ConsulSecretBackend#disable_remount}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#disable_remount ConsulSecretBackend#disable_remount}
---
@@ -219,7 +219,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#id ConsulSecretBackend#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#id ConsulSecretBackend#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -232,7 +232,7 @@ If you experience problems setting this value it might not be settable. Please t
Specifies if the secret backend is local only.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#local ConsulSecretBackend#local}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#local ConsulSecretBackend#local}
---
@@ -242,7 +242,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Maximum possible lease duration for secrets in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#max_lease_ttl_seconds ConsulSecretBackend#max_lease_ttl_seconds}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#max_lease_ttl_seconds ConsulSecretBackend#max_lease_ttl_seconds}
---
@@ -252,7 +252,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#namespace ConsulSecretBackend#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#namespace ConsulSecretBackend#namespace}
---
@@ -262,7 +262,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Unique name of the Vault Consul mount to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#path ConsulSecretBackend#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#path ConsulSecretBackend#path}
---
@@ -272,7 +272,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Specifies the URL scheme to use. Defaults to "http".
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#scheme ConsulSecretBackend#scheme}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#scheme ConsulSecretBackend#scheme}
---
@@ -282,7 +282,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Specifies the Consul token to use when managing or issuing new tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#token ConsulSecretBackend#token}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#token ConsulSecretBackend#token}
---
@@ -807,7 +807,7 @@ The construct id used in the generated config for the ConsulSecretBackend to imp
The id of the existing ConsulSecretBackend that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#import import section} in the documentation of this resource for the id to use
---
@@ -1391,7 +1391,7 @@ ConsulSecretBackendConfig.builder()
| defaultLeaseTtlSeconds
| java.lang.Number
| Default lease duration for secrets in seconds. |
| description
| java.lang.String
| Human-friendly description of the mount for the backend. |
| disableRemount
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| If set, opts out of mount migration on path updates. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#id ConsulSecretBackend#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#id ConsulSecretBackend#id}. |
| local
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| Specifies if the secret backend is local only. |
| maxLeaseTtlSeconds
| java.lang.Number
| Maximum possible lease duration for secrets in seconds. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
@@ -1481,7 +1481,7 @@ public java.lang.String getAddress();
Specifies the address of the Consul instance, provided as "host:port" like "127.0.0.1:8500".
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#address ConsulSecretBackend#address}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#address ConsulSecretBackend#address}
---
@@ -1497,7 +1497,7 @@ Denotes a backend resource that is used to bootstrap the Consul ACL system.
Only one resource may be used to bootstrap.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#bootstrap ConsulSecretBackend#bootstrap}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#bootstrap ConsulSecretBackend#bootstrap}
---
@@ -1511,7 +1511,7 @@ public java.lang.String getCaCert();
CA certificate to use when verifying Consul server certificate, must be x509 PEM encoded.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#ca_cert ConsulSecretBackend#ca_cert}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#ca_cert ConsulSecretBackend#ca_cert}
---
@@ -1525,7 +1525,7 @@ public java.lang.String getClientCert();
Client certificate used for Consul's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_key.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#client_cert ConsulSecretBackend#client_cert}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#client_cert ConsulSecretBackend#client_cert}
---
@@ -1539,7 +1539,7 @@ public java.lang.String getClientKey();
Client key used for Consul's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_cert.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#client_key ConsulSecretBackend#client_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#client_key ConsulSecretBackend#client_key}
---
@@ -1553,7 +1553,7 @@ public java.lang.Number getDefaultLeaseTtlSeconds();
Default lease duration for secrets in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#default_lease_ttl_seconds ConsulSecretBackend#default_lease_ttl_seconds}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#default_lease_ttl_seconds ConsulSecretBackend#default_lease_ttl_seconds}
---
@@ -1567,7 +1567,7 @@ public java.lang.String getDescription();
Human-friendly description of the mount for the backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#description ConsulSecretBackend#description}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#description ConsulSecretBackend#description}
---
@@ -1581,7 +1581,7 @@ public java.lang.Object getDisableRemount();
If set, opts out of mount migration on path updates.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#disable_remount ConsulSecretBackend#disable_remount}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#disable_remount ConsulSecretBackend#disable_remount}
---
@@ -1593,7 +1593,7 @@ public java.lang.String getId();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#id ConsulSecretBackend#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#id ConsulSecretBackend#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1610,7 +1610,7 @@ public java.lang.Object getLocal();
Specifies if the secret backend is local only.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#local ConsulSecretBackend#local}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#local ConsulSecretBackend#local}
---
@@ -1624,7 +1624,7 @@ public java.lang.Number getMaxLeaseTtlSeconds();
Maximum possible lease duration for secrets in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#max_lease_ttl_seconds ConsulSecretBackend#max_lease_ttl_seconds}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#max_lease_ttl_seconds ConsulSecretBackend#max_lease_ttl_seconds}
---
@@ -1638,7 +1638,7 @@ public java.lang.String getNamespace();
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#namespace ConsulSecretBackend#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#namespace ConsulSecretBackend#namespace}
---
@@ -1652,7 +1652,7 @@ public java.lang.String getPath();
Unique name of the Vault Consul mount to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#path ConsulSecretBackend#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#path ConsulSecretBackend#path}
---
@@ -1666,7 +1666,7 @@ public java.lang.String getScheme();
Specifies the URL scheme to use. Defaults to "http".
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#scheme ConsulSecretBackend#scheme}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#scheme ConsulSecretBackend#scheme}
---
@@ -1680,7 +1680,7 @@ public java.lang.String getToken();
Specifies the Consul token to use when managing or issuing new tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#token ConsulSecretBackend#token}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#token ConsulSecretBackend#token}
---
diff --git a/docs/consulSecretBackend.python.md b/docs/consulSecretBackend.python.md
index 123d28c1..3ac866b3 100644
--- a/docs/consulSecretBackend.python.md
+++ b/docs/consulSecretBackend.python.md
@@ -4,7 +4,7 @@
### ConsulSecretBackend
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend vault_consul_secret_backend}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend vault_consul_secret_backend}.
#### Initializers
@@ -58,7 +58,7 @@ consulSecretBackend.ConsulSecretBackend(
| default_lease_ttl_seconds
| typing.Union[int, float]
| Default lease duration for secrets in seconds. |
| description
| str
| Human-friendly description of the mount for the backend. |
| disable_remount
| typing.Union[bool, cdktf.IResolvable]
| If set, opts out of mount migration on path updates. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#id ConsulSecretBackend#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#id ConsulSecretBackend#id}. |
| local
| typing.Union[bool, cdktf.IResolvable]
| Specifies if the secret backend is local only. |
| max_lease_ttl_seconds
| typing.Union[int, float]
| Maximum possible lease duration for secrets in seconds. |
| namespace
| str
| Target namespace. (requires Enterprise). |
@@ -134,7 +134,7 @@ Must be unique amongst siblings in the same scope
Specifies the address of the Consul instance, provided as "host:port" like "127.0.0.1:8500".
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#address ConsulSecretBackend#address}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#address ConsulSecretBackend#address}
---
@@ -146,7 +146,7 @@ Denotes a backend resource that is used to bootstrap the Consul ACL system.
Only one resource may be used to bootstrap.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#bootstrap ConsulSecretBackend#bootstrap}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#bootstrap ConsulSecretBackend#bootstrap}
---
@@ -156,7 +156,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
CA certificate to use when verifying Consul server certificate, must be x509 PEM encoded.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#ca_cert ConsulSecretBackend#ca_cert}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#ca_cert ConsulSecretBackend#ca_cert}
---
@@ -166,7 +166,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Client certificate used for Consul's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_key.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#client_cert ConsulSecretBackend#client_cert}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#client_cert ConsulSecretBackend#client_cert}
---
@@ -176,7 +176,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Client key used for Consul's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_cert.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#client_key ConsulSecretBackend#client_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#client_key ConsulSecretBackend#client_key}
---
@@ -186,7 +186,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Default lease duration for secrets in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#default_lease_ttl_seconds ConsulSecretBackend#default_lease_ttl_seconds}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#default_lease_ttl_seconds ConsulSecretBackend#default_lease_ttl_seconds}
---
@@ -196,7 +196,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Human-friendly description of the mount for the backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#description ConsulSecretBackend#description}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#description ConsulSecretBackend#description}
---
@@ -206,7 +206,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
If set, opts out of mount migration on path updates.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#disable_remount ConsulSecretBackend#disable_remount}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#disable_remount ConsulSecretBackend#disable_remount}
---
@@ -214,7 +214,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#id ConsulSecretBackend#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#id ConsulSecretBackend#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -227,7 +227,7 @@ If you experience problems setting this value it might not be settable. Please t
Specifies if the secret backend is local only.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#local ConsulSecretBackend#local}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#local ConsulSecretBackend#local}
---
@@ -237,7 +237,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Maximum possible lease duration for secrets in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#max_lease_ttl_seconds ConsulSecretBackend#max_lease_ttl_seconds}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#max_lease_ttl_seconds ConsulSecretBackend#max_lease_ttl_seconds}
---
@@ -247,7 +247,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#namespace ConsulSecretBackend#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#namespace ConsulSecretBackend#namespace}
---
@@ -257,7 +257,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Unique name of the Vault Consul mount to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#path ConsulSecretBackend#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#path ConsulSecretBackend#path}
---
@@ -267,7 +267,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Specifies the URL scheme to use. Defaults to "http".
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#scheme ConsulSecretBackend#scheme}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#scheme ConsulSecretBackend#scheme}
---
@@ -277,7 +277,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Specifies the Consul token to use when managing or issuing new tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#token ConsulSecretBackend#token}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#token ConsulSecretBackend#token}
---
@@ -848,7 +848,7 @@ The construct id used in the generated config for the ConsulSecretBackend to imp
The id of the existing ConsulSecretBackend that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#import import section} in the documentation of this resource for the id to use
---
@@ -1425,7 +1425,7 @@ consulSecretBackend.ConsulSecretBackendConfig(
| default_lease_ttl_seconds
| typing.Union[int, float]
| Default lease duration for secrets in seconds. |
| description
| str
| Human-friendly description of the mount for the backend. |
| disable_remount
| typing.Union[bool, cdktf.IResolvable]
| If set, opts out of mount migration on path updates. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#id ConsulSecretBackend#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#id ConsulSecretBackend#id}. |
| local
| typing.Union[bool, cdktf.IResolvable]
| Specifies if the secret backend is local only. |
| max_lease_ttl_seconds
| typing.Union[int, float]
| Maximum possible lease duration for secrets in seconds. |
| namespace
| str
| Target namespace. (requires Enterprise). |
@@ -1515,7 +1515,7 @@ address: str
Specifies the address of the Consul instance, provided as "host:port" like "127.0.0.1:8500".
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#address ConsulSecretBackend#address}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#address ConsulSecretBackend#address}
---
@@ -1531,7 +1531,7 @@ Denotes a backend resource that is used to bootstrap the Consul ACL system.
Only one resource may be used to bootstrap.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#bootstrap ConsulSecretBackend#bootstrap}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#bootstrap ConsulSecretBackend#bootstrap}
---
@@ -1545,7 +1545,7 @@ ca_cert: str
CA certificate to use when verifying Consul server certificate, must be x509 PEM encoded.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#ca_cert ConsulSecretBackend#ca_cert}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#ca_cert ConsulSecretBackend#ca_cert}
---
@@ -1559,7 +1559,7 @@ client_cert: str
Client certificate used for Consul's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_key.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#client_cert ConsulSecretBackend#client_cert}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#client_cert ConsulSecretBackend#client_cert}
---
@@ -1573,7 +1573,7 @@ client_key: str
Client key used for Consul's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_cert.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#client_key ConsulSecretBackend#client_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#client_key ConsulSecretBackend#client_key}
---
@@ -1587,7 +1587,7 @@ default_lease_ttl_seconds: typing.Union[int, float]
Default lease duration for secrets in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#default_lease_ttl_seconds ConsulSecretBackend#default_lease_ttl_seconds}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#default_lease_ttl_seconds ConsulSecretBackend#default_lease_ttl_seconds}
---
@@ -1601,7 +1601,7 @@ description: str
Human-friendly description of the mount for the backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#description ConsulSecretBackend#description}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#description ConsulSecretBackend#description}
---
@@ -1615,7 +1615,7 @@ disable_remount: typing.Union[bool, IResolvable]
If set, opts out of mount migration on path updates.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#disable_remount ConsulSecretBackend#disable_remount}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#disable_remount ConsulSecretBackend#disable_remount}
---
@@ -1627,7 +1627,7 @@ id: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#id ConsulSecretBackend#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#id ConsulSecretBackend#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1644,7 +1644,7 @@ local: typing.Union[bool, IResolvable]
Specifies if the secret backend is local only.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#local ConsulSecretBackend#local}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#local ConsulSecretBackend#local}
---
@@ -1658,7 +1658,7 @@ max_lease_ttl_seconds: typing.Union[int, float]
Maximum possible lease duration for secrets in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#max_lease_ttl_seconds ConsulSecretBackend#max_lease_ttl_seconds}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#max_lease_ttl_seconds ConsulSecretBackend#max_lease_ttl_seconds}
---
@@ -1672,7 +1672,7 @@ namespace: str
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#namespace ConsulSecretBackend#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#namespace ConsulSecretBackend#namespace}
---
@@ -1686,7 +1686,7 @@ path: str
Unique name of the Vault Consul mount to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#path ConsulSecretBackend#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#path ConsulSecretBackend#path}
---
@@ -1700,7 +1700,7 @@ scheme: str
Specifies the URL scheme to use. Defaults to "http".
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#scheme ConsulSecretBackend#scheme}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#scheme ConsulSecretBackend#scheme}
---
@@ -1714,7 +1714,7 @@ token: str
Specifies the Consul token to use when managing or issuing new tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#token ConsulSecretBackend#token}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#token ConsulSecretBackend#token}
---
diff --git a/docs/consulSecretBackend.typescript.md b/docs/consulSecretBackend.typescript.md
index fa471f63..5512aaa1 100644
--- a/docs/consulSecretBackend.typescript.md
+++ b/docs/consulSecretBackend.typescript.md
@@ -4,7 +4,7 @@
### ConsulSecretBackend
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend vault_consul_secret_backend}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend vault_consul_secret_backend}.
#### Initializers
@@ -565,7 +565,7 @@ The construct id used in the generated config for the ConsulSecretBackend to imp
The id of the existing ConsulSecretBackend that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#import import section} in the documentation of this resource for the id to use
---
@@ -1119,7 +1119,7 @@ const consulSecretBackendConfig: consulSecretBackend.ConsulSecretBackendConfig =
| defaultLeaseTtlSeconds
| number
| Default lease duration for secrets in seconds. |
| description
| string
| Human-friendly description of the mount for the backend. |
| disableRemount
| boolean \| cdktf.IResolvable
| If set, opts out of mount migration on path updates. |
-| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#id ConsulSecretBackend#id}. |
+| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#id ConsulSecretBackend#id}. |
| local
| boolean \| cdktf.IResolvable
| Specifies if the secret backend is local only. |
| maxLeaseTtlSeconds
| number
| Maximum possible lease duration for secrets in seconds. |
| namespace
| string
| Target namespace. (requires Enterprise). |
@@ -1209,7 +1209,7 @@ public readonly address: string;
Specifies the address of the Consul instance, provided as "host:port" like "127.0.0.1:8500".
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#address ConsulSecretBackend#address}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#address ConsulSecretBackend#address}
---
@@ -1225,7 +1225,7 @@ Denotes a backend resource that is used to bootstrap the Consul ACL system.
Only one resource may be used to bootstrap.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#bootstrap ConsulSecretBackend#bootstrap}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#bootstrap ConsulSecretBackend#bootstrap}
---
@@ -1239,7 +1239,7 @@ public readonly caCert: string;
CA certificate to use when verifying Consul server certificate, must be x509 PEM encoded.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#ca_cert ConsulSecretBackend#ca_cert}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#ca_cert ConsulSecretBackend#ca_cert}
---
@@ -1253,7 +1253,7 @@ public readonly clientCert: string;
Client certificate used for Consul's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_key.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#client_cert ConsulSecretBackend#client_cert}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#client_cert ConsulSecretBackend#client_cert}
---
@@ -1267,7 +1267,7 @@ public readonly clientKey: string;
Client key used for Consul's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_cert.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#client_key ConsulSecretBackend#client_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#client_key ConsulSecretBackend#client_key}
---
@@ -1281,7 +1281,7 @@ public readonly defaultLeaseTtlSeconds: number;
Default lease duration for secrets in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#default_lease_ttl_seconds ConsulSecretBackend#default_lease_ttl_seconds}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#default_lease_ttl_seconds ConsulSecretBackend#default_lease_ttl_seconds}
---
@@ -1295,7 +1295,7 @@ public readonly description: string;
Human-friendly description of the mount for the backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#description ConsulSecretBackend#description}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#description ConsulSecretBackend#description}
---
@@ -1309,7 +1309,7 @@ public readonly disableRemount: boolean | IResolvable;
If set, opts out of mount migration on path updates.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#disable_remount ConsulSecretBackend#disable_remount}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#disable_remount ConsulSecretBackend#disable_remount}
---
@@ -1321,7 +1321,7 @@ public readonly id: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#id ConsulSecretBackend#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#id ConsulSecretBackend#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1338,7 +1338,7 @@ public readonly local: boolean | IResolvable;
Specifies if the secret backend is local only.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#local ConsulSecretBackend#local}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#local ConsulSecretBackend#local}
---
@@ -1352,7 +1352,7 @@ public readonly maxLeaseTtlSeconds: number;
Maximum possible lease duration for secrets in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#max_lease_ttl_seconds ConsulSecretBackend#max_lease_ttl_seconds}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#max_lease_ttl_seconds ConsulSecretBackend#max_lease_ttl_seconds}
---
@@ -1366,7 +1366,7 @@ public readonly namespace: string;
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#namespace ConsulSecretBackend#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#namespace ConsulSecretBackend#namespace}
---
@@ -1380,7 +1380,7 @@ public readonly path: string;
Unique name of the Vault Consul mount to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#path ConsulSecretBackend#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#path ConsulSecretBackend#path}
---
@@ -1394,7 +1394,7 @@ public readonly scheme: string;
Specifies the URL scheme to use. Defaults to "http".
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#scheme ConsulSecretBackend#scheme}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#scheme ConsulSecretBackend#scheme}
---
@@ -1408,7 +1408,7 @@ public readonly token: string;
Specifies the Consul token to use when managing or issuing new tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#token ConsulSecretBackend#token}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#token ConsulSecretBackend#token}
---
diff --git a/docs/consulSecretBackendRole.csharp.md b/docs/consulSecretBackendRole.csharp.md
index 48622bdf..951af018 100644
--- a/docs/consulSecretBackendRole.csharp.md
+++ b/docs/consulSecretBackendRole.csharp.md
@@ -4,7 +4,7 @@
### ConsulSecretBackendRole
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role vault_consul_secret_backend_role}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role vault_consul_secret_backend_role}.
#### Initializers
@@ -558,7 +558,7 @@ The construct id used in the generated config for the ConsulSecretBackendRole to
The id of the existing ConsulSecretBackendRole that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#import import section} in the documentation of this resource for the id to use
---
@@ -1109,7 +1109,7 @@ new ConsulSecretBackendRoleConfig {
| ConsulNamespace
| string
| The Consul namespace that the token will be created in. Applicable for Vault 1.10+ and Consul 1.7+. |
| ConsulPolicies
| string[]
| List of Consul policies to associate with this role. |
| ConsulRoles
| string[]
| Set of Consul roles to attach to the token. Applicable for Vault 1.10+ with Consul 1.5+. |
-| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#id ConsulSecretBackendRole#id}. |
+| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#id ConsulSecretBackendRole#id}. |
| Local
| object
| Indicates that the token should not be replicated globally and instead be local to the current datacenter. |
| MaxTtl
| double
| Maximum TTL for leases associated with this role, in seconds. |
| Namespace
| string
| Target namespace. (requires Enterprise). |
@@ -1201,7 +1201,7 @@ public string Name { get; set; }
The name of an existing role against which to create this Consul credential.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#name ConsulSecretBackendRole#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#name ConsulSecretBackendRole#name}
---
@@ -1215,7 +1215,7 @@ public string Backend { get; set; }
The path of the Consul Secret Backend the role belongs to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#backend ConsulSecretBackendRole#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#backend ConsulSecretBackendRole#backend}
---
@@ -1229,7 +1229,7 @@ public string ConsulNamespace { get; set; }
The Consul namespace that the token will be created in. Applicable for Vault 1.10+ and Consul 1.7+.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#consul_namespace ConsulSecretBackendRole#consul_namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#consul_namespace ConsulSecretBackendRole#consul_namespace}
---
@@ -1243,7 +1243,7 @@ public string[] ConsulPolicies { get; set; }
List of Consul policies to associate with this role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#consul_policies ConsulSecretBackendRole#consul_policies}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#consul_policies ConsulSecretBackendRole#consul_policies}
---
@@ -1257,7 +1257,7 @@ public string[] ConsulRoles { get; set; }
Set of Consul roles to attach to the token. Applicable for Vault 1.10+ with Consul 1.5+.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#consul_roles ConsulSecretBackendRole#consul_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#consul_roles ConsulSecretBackendRole#consul_roles}
---
@@ -1269,7 +1269,7 @@ public string Id { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#id ConsulSecretBackendRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#id ConsulSecretBackendRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1286,7 +1286,7 @@ public object Local { get; set; }
Indicates that the token should not be replicated globally and instead be local to the current datacenter.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#local ConsulSecretBackendRole#local}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#local ConsulSecretBackendRole#local}
---
@@ -1300,7 +1300,7 @@ public double MaxTtl { get; set; }
Maximum TTL for leases associated with this role, in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#max_ttl ConsulSecretBackendRole#max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#max_ttl ConsulSecretBackendRole#max_ttl}
---
@@ -1314,7 +1314,7 @@ public string Namespace { get; set; }
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#namespace ConsulSecretBackendRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#namespace ConsulSecretBackendRole#namespace}
---
@@ -1328,7 +1328,7 @@ public string[] NodeIdentities { get; set; }
Set of Consul node identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.8+.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#node_identities ConsulSecretBackendRole#node_identities}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#node_identities ConsulSecretBackendRole#node_identities}
---
@@ -1342,7 +1342,7 @@ public string Partition { get; set; }
The Consul admin partition that the token will be created in. Applicable for Vault 1.10+ and Consul 1.11+.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#partition ConsulSecretBackendRole#partition}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#partition ConsulSecretBackendRole#partition}
---
@@ -1356,7 +1356,7 @@ public string[] Policies { get; set; }
List of Consul policies to associate with this role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#policies ConsulSecretBackendRole#policies}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#policies ConsulSecretBackendRole#policies}
---
@@ -1370,7 +1370,7 @@ public string[] ServiceIdentities { get; set; }
Set of Consul service identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.5+.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#service_identities ConsulSecretBackendRole#service_identities}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#service_identities ConsulSecretBackendRole#service_identities}
---
@@ -1384,7 +1384,7 @@ public double Ttl { get; set; }
Specifies the TTL for this role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#ttl ConsulSecretBackendRole#ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#ttl ConsulSecretBackendRole#ttl}
---
diff --git a/docs/consulSecretBackendRole.go.md b/docs/consulSecretBackendRole.go.md
index b33a2903..1f70c6fc 100644
--- a/docs/consulSecretBackendRole.go.md
+++ b/docs/consulSecretBackendRole.go.md
@@ -4,7 +4,7 @@
### ConsulSecretBackendRole
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role vault_consul_secret_backend_role}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role vault_consul_secret_backend_role}.
#### Initializers
@@ -558,7 +558,7 @@ The construct id used in the generated config for the ConsulSecretBackendRole to
The id of the existing ConsulSecretBackendRole that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#import import section} in the documentation of this resource for the id to use
---
@@ -1109,7 +1109,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/consulsecretbackendro
| ConsulNamespace
| *string
| The Consul namespace that the token will be created in. Applicable for Vault 1.10+ and Consul 1.7+. |
| ConsulPolicies
| *[]*string
| List of Consul policies to associate with this role. |
| ConsulRoles
| *[]*string
| Set of Consul roles to attach to the token. Applicable for Vault 1.10+ with Consul 1.5+. |
-| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#id ConsulSecretBackendRole#id}. |
+| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#id ConsulSecretBackendRole#id}. |
| Local
| interface{}
| Indicates that the token should not be replicated globally and instead be local to the current datacenter. |
| MaxTtl
| *f64
| Maximum TTL for leases associated with this role, in seconds. |
| Namespace
| *string
| Target namespace. (requires Enterprise). |
@@ -1201,7 +1201,7 @@ Name *string
The name of an existing role against which to create this Consul credential.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#name ConsulSecretBackendRole#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#name ConsulSecretBackendRole#name}
---
@@ -1215,7 +1215,7 @@ Backend *string
The path of the Consul Secret Backend the role belongs to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#backend ConsulSecretBackendRole#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#backend ConsulSecretBackendRole#backend}
---
@@ -1229,7 +1229,7 @@ ConsulNamespace *string
The Consul namespace that the token will be created in. Applicable for Vault 1.10+ and Consul 1.7+.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#consul_namespace ConsulSecretBackendRole#consul_namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#consul_namespace ConsulSecretBackendRole#consul_namespace}
---
@@ -1243,7 +1243,7 @@ ConsulPolicies *[]*string
List of Consul policies to associate with this role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#consul_policies ConsulSecretBackendRole#consul_policies}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#consul_policies ConsulSecretBackendRole#consul_policies}
---
@@ -1257,7 +1257,7 @@ ConsulRoles *[]*string
Set of Consul roles to attach to the token. Applicable for Vault 1.10+ with Consul 1.5+.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#consul_roles ConsulSecretBackendRole#consul_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#consul_roles ConsulSecretBackendRole#consul_roles}
---
@@ -1269,7 +1269,7 @@ Id *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#id ConsulSecretBackendRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#id ConsulSecretBackendRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1286,7 +1286,7 @@ Local interface{}
Indicates that the token should not be replicated globally and instead be local to the current datacenter.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#local ConsulSecretBackendRole#local}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#local ConsulSecretBackendRole#local}
---
@@ -1300,7 +1300,7 @@ MaxTtl *f64
Maximum TTL for leases associated with this role, in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#max_ttl ConsulSecretBackendRole#max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#max_ttl ConsulSecretBackendRole#max_ttl}
---
@@ -1314,7 +1314,7 @@ Namespace *string
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#namespace ConsulSecretBackendRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#namespace ConsulSecretBackendRole#namespace}
---
@@ -1328,7 +1328,7 @@ NodeIdentities *[]*string
Set of Consul node identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.8+.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#node_identities ConsulSecretBackendRole#node_identities}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#node_identities ConsulSecretBackendRole#node_identities}
---
@@ -1342,7 +1342,7 @@ Partition *string
The Consul admin partition that the token will be created in. Applicable for Vault 1.10+ and Consul 1.11+.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#partition ConsulSecretBackendRole#partition}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#partition ConsulSecretBackendRole#partition}
---
@@ -1356,7 +1356,7 @@ Policies *[]*string
List of Consul policies to associate with this role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#policies ConsulSecretBackendRole#policies}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#policies ConsulSecretBackendRole#policies}
---
@@ -1370,7 +1370,7 @@ ServiceIdentities *[]*string
Set of Consul service identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.5+.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#service_identities ConsulSecretBackendRole#service_identities}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#service_identities ConsulSecretBackendRole#service_identities}
---
@@ -1384,7 +1384,7 @@ Ttl *f64
Specifies the TTL for this role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#ttl ConsulSecretBackendRole#ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#ttl ConsulSecretBackendRole#ttl}
---
diff --git a/docs/consulSecretBackendRole.java.md b/docs/consulSecretBackendRole.java.md
index bf89ccef..00630933 100644
--- a/docs/consulSecretBackendRole.java.md
+++ b/docs/consulSecretBackendRole.java.md
@@ -4,7 +4,7 @@
### ConsulSecretBackendRole
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role vault_consul_secret_backend_role}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role vault_consul_secret_backend_role}.
#### Initializers
@@ -57,7 +57,7 @@ ConsulSecretBackendRole.Builder.create(Construct scope, java.lang.String id)
| consulNamespace
| java.lang.String
| The Consul namespace that the token will be created in. Applicable for Vault 1.10+ and Consul 1.7+. |
| consulPolicies
| java.util.List
| List of Consul policies to associate with this role. |
| consulRoles
| java.util.List
| Set of Consul roles to attach to the token. Applicable for Vault 1.10+ with Consul 1.5+. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#id ConsulSecretBackendRole#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#id ConsulSecretBackendRole#id}. |
| local
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| Indicates that the token should not be replicated globally and instead be local to the current datacenter. |
| maxTtl
| java.lang.Number
| Maximum TTL for leases associated with this role, in seconds. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
@@ -135,7 +135,7 @@ Must be unique amongst siblings in the same scope
The name of an existing role against which to create this Consul credential.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#name ConsulSecretBackendRole#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#name ConsulSecretBackendRole#name}
---
@@ -145,7 +145,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The path of the Consul Secret Backend the role belongs to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#backend ConsulSecretBackendRole#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#backend ConsulSecretBackendRole#backend}
---
@@ -155,7 +155,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The Consul namespace that the token will be created in. Applicable for Vault 1.10+ and Consul 1.7+.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#consul_namespace ConsulSecretBackendRole#consul_namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#consul_namespace ConsulSecretBackendRole#consul_namespace}
---
@@ -165,7 +165,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
List of Consul policies to associate with this role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#consul_policies ConsulSecretBackendRole#consul_policies}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#consul_policies ConsulSecretBackendRole#consul_policies}
---
@@ -175,7 +175,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Set of Consul roles to attach to the token. Applicable for Vault 1.10+ with Consul 1.5+.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#consul_roles ConsulSecretBackendRole#consul_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#consul_roles ConsulSecretBackendRole#consul_roles}
---
@@ -183,7 +183,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#id ConsulSecretBackendRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#id ConsulSecretBackendRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -196,7 +196,7 @@ If you experience problems setting this value it might not be settable. Please t
Indicates that the token should not be replicated globally and instead be local to the current datacenter.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#local ConsulSecretBackendRole#local}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#local ConsulSecretBackendRole#local}
---
@@ -206,7 +206,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Maximum TTL for leases associated with this role, in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#max_ttl ConsulSecretBackendRole#max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#max_ttl ConsulSecretBackendRole#max_ttl}
---
@@ -216,7 +216,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#namespace ConsulSecretBackendRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#namespace ConsulSecretBackendRole#namespace}
---
@@ -226,7 +226,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Set of Consul node identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.8+.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#node_identities ConsulSecretBackendRole#node_identities}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#node_identities ConsulSecretBackendRole#node_identities}
---
@@ -236,7 +236,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The Consul admin partition that the token will be created in. Applicable for Vault 1.10+ and Consul 1.11+.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#partition ConsulSecretBackendRole#partition}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#partition ConsulSecretBackendRole#partition}
---
@@ -246,7 +246,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
List of Consul policies to associate with this role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#policies ConsulSecretBackendRole#policies}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#policies ConsulSecretBackendRole#policies}
---
@@ -256,7 +256,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Set of Consul service identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.5+.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#service_identities ConsulSecretBackendRole#service_identities}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#service_identities ConsulSecretBackendRole#service_identities}
---
@@ -266,7 +266,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Specifies the TTL for this role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#ttl ConsulSecretBackendRole#ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#ttl ConsulSecretBackendRole#ttl}
---
@@ -784,7 +784,7 @@ The construct id used in the generated config for the ConsulSecretBackendRole to
The id of the existing ConsulSecretBackendRole that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#import import section} in the documentation of this resource for the id to use
---
@@ -1340,7 +1340,7 @@ ConsulSecretBackendRoleConfig.builder()
| consulNamespace
| java.lang.String
| The Consul namespace that the token will be created in. Applicable for Vault 1.10+ and Consul 1.7+. |
| consulPolicies
| java.util.List
| List of Consul policies to associate with this role. |
| consulRoles
| java.util.List
| Set of Consul roles to attach to the token. Applicable for Vault 1.10+ with Consul 1.5+. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#id ConsulSecretBackendRole#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#id ConsulSecretBackendRole#id}. |
| local
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| Indicates that the token should not be replicated globally and instead be local to the current datacenter. |
| maxTtl
| java.lang.Number
| Maximum TTL for leases associated with this role, in seconds. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
@@ -1432,7 +1432,7 @@ public java.lang.String getName();
The name of an existing role against which to create this Consul credential.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#name ConsulSecretBackendRole#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#name ConsulSecretBackendRole#name}
---
@@ -1446,7 +1446,7 @@ public java.lang.String getBackend();
The path of the Consul Secret Backend the role belongs to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#backend ConsulSecretBackendRole#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#backend ConsulSecretBackendRole#backend}
---
@@ -1460,7 +1460,7 @@ public java.lang.String getConsulNamespace();
The Consul namespace that the token will be created in. Applicable for Vault 1.10+ and Consul 1.7+.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#consul_namespace ConsulSecretBackendRole#consul_namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#consul_namespace ConsulSecretBackendRole#consul_namespace}
---
@@ -1474,7 +1474,7 @@ public java.util.List getConsulPolicies();
List of Consul policies to associate with this role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#consul_policies ConsulSecretBackendRole#consul_policies}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#consul_policies ConsulSecretBackendRole#consul_policies}
---
@@ -1488,7 +1488,7 @@ public java.util.List getConsulRoles();
Set of Consul roles to attach to the token. Applicable for Vault 1.10+ with Consul 1.5+.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#consul_roles ConsulSecretBackendRole#consul_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#consul_roles ConsulSecretBackendRole#consul_roles}
---
@@ -1500,7 +1500,7 @@ public java.lang.String getId();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#id ConsulSecretBackendRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#id ConsulSecretBackendRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1517,7 +1517,7 @@ public java.lang.Object getLocal();
Indicates that the token should not be replicated globally and instead be local to the current datacenter.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#local ConsulSecretBackendRole#local}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#local ConsulSecretBackendRole#local}
---
@@ -1531,7 +1531,7 @@ public java.lang.Number getMaxTtl();
Maximum TTL for leases associated with this role, in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#max_ttl ConsulSecretBackendRole#max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#max_ttl ConsulSecretBackendRole#max_ttl}
---
@@ -1545,7 +1545,7 @@ public java.lang.String getNamespace();
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#namespace ConsulSecretBackendRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#namespace ConsulSecretBackendRole#namespace}
---
@@ -1559,7 +1559,7 @@ public java.util.List getNodeIdentities();
Set of Consul node identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.8+.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#node_identities ConsulSecretBackendRole#node_identities}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#node_identities ConsulSecretBackendRole#node_identities}
---
@@ -1573,7 +1573,7 @@ public java.lang.String getPartition();
The Consul admin partition that the token will be created in. Applicable for Vault 1.10+ and Consul 1.11+.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#partition ConsulSecretBackendRole#partition}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#partition ConsulSecretBackendRole#partition}
---
@@ -1587,7 +1587,7 @@ public java.util.List getPolicies();
List of Consul policies to associate with this role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#policies ConsulSecretBackendRole#policies}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#policies ConsulSecretBackendRole#policies}
---
@@ -1601,7 +1601,7 @@ public java.util.List getServiceIdentities();
Set of Consul service identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.5+.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#service_identities ConsulSecretBackendRole#service_identities}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#service_identities ConsulSecretBackendRole#service_identities}
---
@@ -1615,7 +1615,7 @@ public java.lang.Number getTtl();
Specifies the TTL for this role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#ttl ConsulSecretBackendRole#ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#ttl ConsulSecretBackendRole#ttl}
---
diff --git a/docs/consulSecretBackendRole.python.md b/docs/consulSecretBackendRole.python.md
index 22eea240..79f89d67 100644
--- a/docs/consulSecretBackendRole.python.md
+++ b/docs/consulSecretBackendRole.python.md
@@ -4,7 +4,7 @@
### ConsulSecretBackendRole
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role vault_consul_secret_backend_role}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role vault_consul_secret_backend_role}.
#### Initializers
@@ -54,7 +54,7 @@ consulSecretBackendRole.ConsulSecretBackendRole(
| consul_namespace
| str
| The Consul namespace that the token will be created in. Applicable for Vault 1.10+ and Consul 1.7+. |
| consul_policies
| typing.List[str]
| List of Consul policies to associate with this role. |
| consul_roles
| typing.List[str]
| Set of Consul roles to attach to the token. Applicable for Vault 1.10+ with Consul 1.5+. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#id ConsulSecretBackendRole#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#id ConsulSecretBackendRole#id}. |
| local
| typing.Union[bool, cdktf.IResolvable]
| Indicates that the token should not be replicated globally and instead be local to the current datacenter. |
| max_ttl
| typing.Union[int, float]
| Maximum TTL for leases associated with this role, in seconds. |
| namespace
| str
| Target namespace. (requires Enterprise). |
@@ -132,7 +132,7 @@ Must be unique amongst siblings in the same scope
The name of an existing role against which to create this Consul credential.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#name ConsulSecretBackendRole#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#name ConsulSecretBackendRole#name}
---
@@ -142,7 +142,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The path of the Consul Secret Backend the role belongs to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#backend ConsulSecretBackendRole#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#backend ConsulSecretBackendRole#backend}
---
@@ -152,7 +152,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The Consul namespace that the token will be created in. Applicable for Vault 1.10+ and Consul 1.7+.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#consul_namespace ConsulSecretBackendRole#consul_namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#consul_namespace ConsulSecretBackendRole#consul_namespace}
---
@@ -162,7 +162,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
List of Consul policies to associate with this role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#consul_policies ConsulSecretBackendRole#consul_policies}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#consul_policies ConsulSecretBackendRole#consul_policies}
---
@@ -172,7 +172,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Set of Consul roles to attach to the token. Applicable for Vault 1.10+ with Consul 1.5+.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#consul_roles ConsulSecretBackendRole#consul_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#consul_roles ConsulSecretBackendRole#consul_roles}
---
@@ -180,7 +180,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#id ConsulSecretBackendRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#id ConsulSecretBackendRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -193,7 +193,7 @@ If you experience problems setting this value it might not be settable. Please t
Indicates that the token should not be replicated globally and instead be local to the current datacenter.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#local ConsulSecretBackendRole#local}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#local ConsulSecretBackendRole#local}
---
@@ -203,7 +203,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Maximum TTL for leases associated with this role, in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#max_ttl ConsulSecretBackendRole#max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#max_ttl ConsulSecretBackendRole#max_ttl}
---
@@ -213,7 +213,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#namespace ConsulSecretBackendRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#namespace ConsulSecretBackendRole#namespace}
---
@@ -223,7 +223,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Set of Consul node identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.8+.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#node_identities ConsulSecretBackendRole#node_identities}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#node_identities ConsulSecretBackendRole#node_identities}
---
@@ -233,7 +233,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The Consul admin partition that the token will be created in. Applicable for Vault 1.10+ and Consul 1.11+.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#partition ConsulSecretBackendRole#partition}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#partition ConsulSecretBackendRole#partition}
---
@@ -243,7 +243,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
List of Consul policies to associate with this role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#policies ConsulSecretBackendRole#policies}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#policies ConsulSecretBackendRole#policies}
---
@@ -253,7 +253,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Set of Consul service identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.5+.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#service_identities ConsulSecretBackendRole#service_identities}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#service_identities ConsulSecretBackendRole#service_identities}
---
@@ -263,7 +263,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Specifies the TTL for this role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#ttl ConsulSecretBackendRole#ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#ttl ConsulSecretBackendRole#ttl}
---
@@ -827,7 +827,7 @@ The construct id used in the generated config for the ConsulSecretBackendRole to
The id of the existing ConsulSecretBackendRole that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#import import section} in the documentation of this resource for the id to use
---
@@ -1378,7 +1378,7 @@ consulSecretBackendRole.ConsulSecretBackendRoleConfig(
| consul_namespace
| str
| The Consul namespace that the token will be created in. Applicable for Vault 1.10+ and Consul 1.7+. |
| consul_policies
| typing.List[str]
| List of Consul policies to associate with this role. |
| consul_roles
| typing.List[str]
| Set of Consul roles to attach to the token. Applicable for Vault 1.10+ with Consul 1.5+. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#id ConsulSecretBackendRole#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#id ConsulSecretBackendRole#id}. |
| local
| typing.Union[bool, cdktf.IResolvable]
| Indicates that the token should not be replicated globally and instead be local to the current datacenter. |
| max_ttl
| typing.Union[int, float]
| Maximum TTL for leases associated with this role, in seconds. |
| namespace
| str
| Target namespace. (requires Enterprise). |
@@ -1470,7 +1470,7 @@ name: str
The name of an existing role against which to create this Consul credential.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#name ConsulSecretBackendRole#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#name ConsulSecretBackendRole#name}
---
@@ -1484,7 +1484,7 @@ backend: str
The path of the Consul Secret Backend the role belongs to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#backend ConsulSecretBackendRole#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#backend ConsulSecretBackendRole#backend}
---
@@ -1498,7 +1498,7 @@ consul_namespace: str
The Consul namespace that the token will be created in. Applicable for Vault 1.10+ and Consul 1.7+.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#consul_namespace ConsulSecretBackendRole#consul_namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#consul_namespace ConsulSecretBackendRole#consul_namespace}
---
@@ -1512,7 +1512,7 @@ consul_policies: typing.List[str]
List of Consul policies to associate with this role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#consul_policies ConsulSecretBackendRole#consul_policies}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#consul_policies ConsulSecretBackendRole#consul_policies}
---
@@ -1526,7 +1526,7 @@ consul_roles: typing.List[str]
Set of Consul roles to attach to the token. Applicable for Vault 1.10+ with Consul 1.5+.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#consul_roles ConsulSecretBackendRole#consul_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#consul_roles ConsulSecretBackendRole#consul_roles}
---
@@ -1538,7 +1538,7 @@ id: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#id ConsulSecretBackendRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#id ConsulSecretBackendRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1555,7 +1555,7 @@ local: typing.Union[bool, IResolvable]
Indicates that the token should not be replicated globally and instead be local to the current datacenter.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#local ConsulSecretBackendRole#local}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#local ConsulSecretBackendRole#local}
---
@@ -1569,7 +1569,7 @@ max_ttl: typing.Union[int, float]
Maximum TTL for leases associated with this role, in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#max_ttl ConsulSecretBackendRole#max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#max_ttl ConsulSecretBackendRole#max_ttl}
---
@@ -1583,7 +1583,7 @@ namespace: str
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#namespace ConsulSecretBackendRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#namespace ConsulSecretBackendRole#namespace}
---
@@ -1597,7 +1597,7 @@ node_identities: typing.List[str]
Set of Consul node identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.8+.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#node_identities ConsulSecretBackendRole#node_identities}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#node_identities ConsulSecretBackendRole#node_identities}
---
@@ -1611,7 +1611,7 @@ partition: str
The Consul admin partition that the token will be created in. Applicable for Vault 1.10+ and Consul 1.11+.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#partition ConsulSecretBackendRole#partition}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#partition ConsulSecretBackendRole#partition}
---
@@ -1625,7 +1625,7 @@ policies: typing.List[str]
List of Consul policies to associate with this role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#policies ConsulSecretBackendRole#policies}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#policies ConsulSecretBackendRole#policies}
---
@@ -1639,7 +1639,7 @@ service_identities: typing.List[str]
Set of Consul service identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.5+.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#service_identities ConsulSecretBackendRole#service_identities}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#service_identities ConsulSecretBackendRole#service_identities}
---
@@ -1653,7 +1653,7 @@ ttl: typing.Union[int, float]
Specifies the TTL for this role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#ttl ConsulSecretBackendRole#ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#ttl ConsulSecretBackendRole#ttl}
---
diff --git a/docs/consulSecretBackendRole.typescript.md b/docs/consulSecretBackendRole.typescript.md
index e86aa76e..f5ef58e8 100644
--- a/docs/consulSecretBackendRole.typescript.md
+++ b/docs/consulSecretBackendRole.typescript.md
@@ -4,7 +4,7 @@
### ConsulSecretBackendRole
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role vault_consul_secret_backend_role}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role vault_consul_secret_backend_role}.
#### Initializers
@@ -558,7 +558,7 @@ The construct id used in the generated config for the ConsulSecretBackendRole to
The id of the existing ConsulSecretBackendRole that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#import import section} in the documentation of this resource for the id to use
---
@@ -1087,7 +1087,7 @@ const consulSecretBackendRoleConfig: consulSecretBackendRole.ConsulSecretBackend
| consulNamespace
| string
| The Consul namespace that the token will be created in. Applicable for Vault 1.10+ and Consul 1.7+. |
| consulPolicies
| string[]
| List of Consul policies to associate with this role. |
| consulRoles
| string[]
| Set of Consul roles to attach to the token. Applicable for Vault 1.10+ with Consul 1.5+. |
-| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#id ConsulSecretBackendRole#id}. |
+| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#id ConsulSecretBackendRole#id}. |
| local
| boolean \| cdktf.IResolvable
| Indicates that the token should not be replicated globally and instead be local to the current datacenter. |
| maxTtl
| number
| Maximum TTL for leases associated with this role, in seconds. |
| namespace
| string
| Target namespace. (requires Enterprise). |
@@ -1179,7 +1179,7 @@ public readonly name: string;
The name of an existing role against which to create this Consul credential.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#name ConsulSecretBackendRole#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#name ConsulSecretBackendRole#name}
---
@@ -1193,7 +1193,7 @@ public readonly backend: string;
The path of the Consul Secret Backend the role belongs to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#backend ConsulSecretBackendRole#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#backend ConsulSecretBackendRole#backend}
---
@@ -1207,7 +1207,7 @@ public readonly consulNamespace: string;
The Consul namespace that the token will be created in. Applicable for Vault 1.10+ and Consul 1.7+.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#consul_namespace ConsulSecretBackendRole#consul_namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#consul_namespace ConsulSecretBackendRole#consul_namespace}
---
@@ -1221,7 +1221,7 @@ public readonly consulPolicies: string[];
List of Consul policies to associate with this role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#consul_policies ConsulSecretBackendRole#consul_policies}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#consul_policies ConsulSecretBackendRole#consul_policies}
---
@@ -1235,7 +1235,7 @@ public readonly consulRoles: string[];
Set of Consul roles to attach to the token. Applicable for Vault 1.10+ with Consul 1.5+.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#consul_roles ConsulSecretBackendRole#consul_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#consul_roles ConsulSecretBackendRole#consul_roles}
---
@@ -1247,7 +1247,7 @@ public readonly id: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#id ConsulSecretBackendRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#id ConsulSecretBackendRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1264,7 +1264,7 @@ public readonly local: boolean | IResolvable;
Indicates that the token should not be replicated globally and instead be local to the current datacenter.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#local ConsulSecretBackendRole#local}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#local ConsulSecretBackendRole#local}
---
@@ -1278,7 +1278,7 @@ public readonly maxTtl: number;
Maximum TTL for leases associated with this role, in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#max_ttl ConsulSecretBackendRole#max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#max_ttl ConsulSecretBackendRole#max_ttl}
---
@@ -1292,7 +1292,7 @@ public readonly namespace: string;
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#namespace ConsulSecretBackendRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#namespace ConsulSecretBackendRole#namespace}
---
@@ -1306,7 +1306,7 @@ public readonly nodeIdentities: string[];
Set of Consul node identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.8+.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#node_identities ConsulSecretBackendRole#node_identities}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#node_identities ConsulSecretBackendRole#node_identities}
---
@@ -1320,7 +1320,7 @@ public readonly partition: string;
The Consul admin partition that the token will be created in. Applicable for Vault 1.10+ and Consul 1.11+.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#partition ConsulSecretBackendRole#partition}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#partition ConsulSecretBackendRole#partition}
---
@@ -1334,7 +1334,7 @@ public readonly policies: string[];
List of Consul policies to associate with this role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#policies ConsulSecretBackendRole#policies}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#policies ConsulSecretBackendRole#policies}
---
@@ -1348,7 +1348,7 @@ public readonly serviceIdentities: string[];
Set of Consul service identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.5+.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#service_identities ConsulSecretBackendRole#service_identities}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#service_identities ConsulSecretBackendRole#service_identities}
---
@@ -1362,7 +1362,7 @@ public readonly ttl: number;
Specifies the TTL for this role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#ttl ConsulSecretBackendRole#ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#ttl ConsulSecretBackendRole#ttl}
---
diff --git a/docs/dataVaultAdAccessCredentials.csharp.md b/docs/dataVaultAdAccessCredentials.csharp.md
index c7e65992..23aac32b 100644
--- a/docs/dataVaultAdAccessCredentials.csharp.md
+++ b/docs/dataVaultAdAccessCredentials.csharp.md
@@ -4,7 +4,7 @@
### DataVaultAdAccessCredentials
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ad_access_credentials vault_ad_access_credentials}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ad_access_credentials vault_ad_access_credentials}.
#### Initializers
@@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultAdAccessCredentia
The id of the existing DataVaultAdAccessCredentials that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ad_access_credentials#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ad_access_credentials#import import section} in the documentation of this resource for the id to use
---
@@ -708,7 +708,7 @@ new DataVaultAdAccessCredentialsConfig {
| Provisioners
| object[]
| *No description.* |
| Backend
| string
| AD Secret Backend to read credentials from. |
| Role
| string
| Name of the role. |
-| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ad_access_credentials#id DataVaultAdAccessCredentials#id}. |
+| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ad_access_credentials#id DataVaultAdAccessCredentials#id}. |
| Namespace
| string
| Target namespace. (requires Enterprise). |
---
@@ -793,7 +793,7 @@ public string Backend { get; set; }
AD Secret Backend to read credentials from.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ad_access_credentials#backend DataVaultAdAccessCredentials#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ad_access_credentials#backend DataVaultAdAccessCredentials#backend}
---
@@ -807,7 +807,7 @@ public string Role { get; set; }
Name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ad_access_credentials#role DataVaultAdAccessCredentials#role}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ad_access_credentials#role DataVaultAdAccessCredentials#role}
---
@@ -819,7 +819,7 @@ public string Id { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ad_access_credentials#id DataVaultAdAccessCredentials#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ad_access_credentials#id DataVaultAdAccessCredentials#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -836,7 +836,7 @@ public string Namespace { get; set; }
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ad_access_credentials#namespace DataVaultAdAccessCredentials#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ad_access_credentials#namespace DataVaultAdAccessCredentials#namespace}
---
diff --git a/docs/dataVaultAdAccessCredentials.go.md b/docs/dataVaultAdAccessCredentials.go.md
index 7ca7d621..bd6f74d1 100644
--- a/docs/dataVaultAdAccessCredentials.go.md
+++ b/docs/dataVaultAdAccessCredentials.go.md
@@ -4,7 +4,7 @@
### DataVaultAdAccessCredentials
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ad_access_credentials vault_ad_access_credentials}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ad_access_credentials vault_ad_access_credentials}.
#### Initializers
@@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultAdAccessCredentia
The id of the existing DataVaultAdAccessCredentials that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ad_access_credentials#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ad_access_credentials#import import section} in the documentation of this resource for the id to use
---
@@ -708,7 +708,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultadaccesscred
| Provisioners
| *[]interface{}
| *No description.* |
| Backend
| *string
| AD Secret Backend to read credentials from. |
| Role
| *string
| Name of the role. |
-| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ad_access_credentials#id DataVaultAdAccessCredentials#id}. |
+| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ad_access_credentials#id DataVaultAdAccessCredentials#id}. |
| Namespace
| *string
| Target namespace. (requires Enterprise). |
---
@@ -793,7 +793,7 @@ Backend *string
AD Secret Backend to read credentials from.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ad_access_credentials#backend DataVaultAdAccessCredentials#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ad_access_credentials#backend DataVaultAdAccessCredentials#backend}
---
@@ -807,7 +807,7 @@ Role *string
Name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ad_access_credentials#role DataVaultAdAccessCredentials#role}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ad_access_credentials#role DataVaultAdAccessCredentials#role}
---
@@ -819,7 +819,7 @@ Id *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ad_access_credentials#id DataVaultAdAccessCredentials#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ad_access_credentials#id DataVaultAdAccessCredentials#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -836,7 +836,7 @@ Namespace *string
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ad_access_credentials#namespace DataVaultAdAccessCredentials#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ad_access_credentials#namespace DataVaultAdAccessCredentials#namespace}
---
diff --git a/docs/dataVaultAdAccessCredentials.java.md b/docs/dataVaultAdAccessCredentials.java.md
index 75930d3c..b6c417df 100644
--- a/docs/dataVaultAdAccessCredentials.java.md
+++ b/docs/dataVaultAdAccessCredentials.java.md
@@ -4,7 +4,7 @@
### DataVaultAdAccessCredentials
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ad_access_credentials vault_ad_access_credentials}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ad_access_credentials vault_ad_access_credentials}.
#### Initializers
@@ -43,7 +43,7 @@ DataVaultAdAccessCredentials.Builder.create(Construct scope, java.lang.String id
| provisioners
| java.util.List
| *No description.* |
| backend
| java.lang.String
| AD Secret Backend to read credentials from. |
| role
| java.lang.String
| Name of the role. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ad_access_credentials#id DataVaultAdAccessCredentials#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ad_access_credentials#id DataVaultAdAccessCredentials#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
---
@@ -114,7 +114,7 @@ Must be unique amongst siblings in the same scope
AD Secret Backend to read credentials from.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ad_access_credentials#backend DataVaultAdAccessCredentials#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ad_access_credentials#backend DataVaultAdAccessCredentials#backend}
---
@@ -124,7 +124,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ad_access_credentials#role DataVaultAdAccessCredentials#role}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ad_access_credentials#role DataVaultAdAccessCredentials#role}
---
@@ -132,7 +132,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ad_access_credentials#id DataVaultAdAccessCredentials#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ad_access_credentials#id DataVaultAdAccessCredentials#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -145,7 +145,7 @@ If you experience problems setting this value it might not be settable. Please t
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ad_access_credentials#namespace DataVaultAdAccessCredentials#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ad_access_credentials#namespace DataVaultAdAccessCredentials#namespace}
---
@@ -482,7 +482,7 @@ The construct id used in the generated config for the DataVaultAdAccessCredentia
The id of the existing DataVaultAdAccessCredentials that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ad_access_credentials#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ad_access_credentials#import import section} in the documentation of this resource for the id to use
---
@@ -815,7 +815,7 @@ DataVaultAdAccessCredentialsConfig.builder()
| provisioners
| java.util.List
| *No description.* |
| backend
| java.lang.String
| AD Secret Backend to read credentials from. |
| role
| java.lang.String
| Name of the role. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ad_access_credentials#id DataVaultAdAccessCredentials#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ad_access_credentials#id DataVaultAdAccessCredentials#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
---
@@ -900,7 +900,7 @@ public java.lang.String getBackend();
AD Secret Backend to read credentials from.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ad_access_credentials#backend DataVaultAdAccessCredentials#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ad_access_credentials#backend DataVaultAdAccessCredentials#backend}
---
@@ -914,7 +914,7 @@ public java.lang.String getRole();
Name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ad_access_credentials#role DataVaultAdAccessCredentials#role}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ad_access_credentials#role DataVaultAdAccessCredentials#role}
---
@@ -926,7 +926,7 @@ public java.lang.String getId();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ad_access_credentials#id DataVaultAdAccessCredentials#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ad_access_credentials#id DataVaultAdAccessCredentials#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -943,7 +943,7 @@ public java.lang.String getNamespace();
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ad_access_credentials#namespace DataVaultAdAccessCredentials#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ad_access_credentials#namespace DataVaultAdAccessCredentials#namespace}
---
diff --git a/docs/dataVaultAdAccessCredentials.python.md b/docs/dataVaultAdAccessCredentials.python.md
index 733f6295..61a0476f 100644
--- a/docs/dataVaultAdAccessCredentials.python.md
+++ b/docs/dataVaultAdAccessCredentials.python.md
@@ -4,7 +4,7 @@
### DataVaultAdAccessCredentials
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ad_access_credentials vault_ad_access_credentials}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ad_access_credentials vault_ad_access_credentials}.
#### Initializers
@@ -41,7 +41,7 @@ dataVaultAdAccessCredentials.DataVaultAdAccessCredentials(
| provisioners
| typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]]
| *No description.* |
| backend
| str
| AD Secret Backend to read credentials from. |
| role
| str
| Name of the role. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ad_access_credentials#id DataVaultAdAccessCredentials#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ad_access_credentials#id DataVaultAdAccessCredentials#id}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
---
@@ -112,7 +112,7 @@ Must be unique amongst siblings in the same scope
AD Secret Backend to read credentials from.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ad_access_credentials#backend DataVaultAdAccessCredentials#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ad_access_credentials#backend DataVaultAdAccessCredentials#backend}
---
@@ -122,7 +122,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ad_access_credentials#role DataVaultAdAccessCredentials#role}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ad_access_credentials#role DataVaultAdAccessCredentials#role}
---
@@ -130,7 +130,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ad_access_credentials#id DataVaultAdAccessCredentials#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ad_access_credentials#id DataVaultAdAccessCredentials#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -143,7 +143,7 @@ If you experience problems setting this value it might not be settable. Please t
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ad_access_credentials#namespace DataVaultAdAccessCredentials#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ad_access_credentials#namespace DataVaultAdAccessCredentials#namespace}
---
@@ -516,7 +516,7 @@ The construct id used in the generated config for the DataVaultAdAccessCredentia
The id of the existing DataVaultAdAccessCredentials that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ad_access_credentials#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ad_access_credentials#import import section} in the documentation of this resource for the id to use
---
@@ -845,7 +845,7 @@ dataVaultAdAccessCredentials.DataVaultAdAccessCredentialsConfig(
| provisioners
| typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]]
| *No description.* |
| backend
| str
| AD Secret Backend to read credentials from. |
| role
| str
| Name of the role. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ad_access_credentials#id DataVaultAdAccessCredentials#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ad_access_credentials#id DataVaultAdAccessCredentials#id}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
---
@@ -930,7 +930,7 @@ backend: str
AD Secret Backend to read credentials from.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ad_access_credentials#backend DataVaultAdAccessCredentials#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ad_access_credentials#backend DataVaultAdAccessCredentials#backend}
---
@@ -944,7 +944,7 @@ role: str
Name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ad_access_credentials#role DataVaultAdAccessCredentials#role}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ad_access_credentials#role DataVaultAdAccessCredentials#role}
---
@@ -956,7 +956,7 @@ id: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ad_access_credentials#id DataVaultAdAccessCredentials#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ad_access_credentials#id DataVaultAdAccessCredentials#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -973,7 +973,7 @@ namespace: str
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ad_access_credentials#namespace DataVaultAdAccessCredentials#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ad_access_credentials#namespace DataVaultAdAccessCredentials#namespace}
---
diff --git a/docs/dataVaultAdAccessCredentials.typescript.md b/docs/dataVaultAdAccessCredentials.typescript.md
index 1dacd768..15655790 100644
--- a/docs/dataVaultAdAccessCredentials.typescript.md
+++ b/docs/dataVaultAdAccessCredentials.typescript.md
@@ -4,7 +4,7 @@
### DataVaultAdAccessCredentials
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ad_access_credentials vault_ad_access_credentials}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ad_access_credentials vault_ad_access_credentials}.
#### Initializers
@@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultAdAccessCredentia
The id of the existing DataVaultAdAccessCredentials that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ad_access_credentials#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ad_access_credentials#import import section} in the documentation of this resource for the id to use
---
@@ -696,7 +696,7 @@ const dataVaultAdAccessCredentialsConfig: dataVaultAdAccessCredentials.DataVault
| provisioners
| cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[]
| *No description.* |
| backend
| string
| AD Secret Backend to read credentials from. |
| role
| string
| Name of the role. |
-| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ad_access_credentials#id DataVaultAdAccessCredentials#id}. |
+| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ad_access_credentials#id DataVaultAdAccessCredentials#id}. |
| namespace
| string
| Target namespace. (requires Enterprise). |
---
@@ -781,7 +781,7 @@ public readonly backend: string;
AD Secret Backend to read credentials from.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ad_access_credentials#backend DataVaultAdAccessCredentials#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ad_access_credentials#backend DataVaultAdAccessCredentials#backend}
---
@@ -795,7 +795,7 @@ public readonly role: string;
Name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ad_access_credentials#role DataVaultAdAccessCredentials#role}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ad_access_credentials#role DataVaultAdAccessCredentials#role}
---
@@ -807,7 +807,7 @@ public readonly id: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ad_access_credentials#id DataVaultAdAccessCredentials#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ad_access_credentials#id DataVaultAdAccessCredentials#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -824,7 +824,7 @@ public readonly namespace: string;
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ad_access_credentials#namespace DataVaultAdAccessCredentials#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ad_access_credentials#namespace DataVaultAdAccessCredentials#namespace}
---
diff --git a/docs/dataVaultApproleAuthBackendRoleId.csharp.md b/docs/dataVaultApproleAuthBackendRoleId.csharp.md
index a0125d5c..78363f4a 100644
--- a/docs/dataVaultApproleAuthBackendRoleId.csharp.md
+++ b/docs/dataVaultApproleAuthBackendRoleId.csharp.md
@@ -4,7 +4,7 @@
### DataVaultApproleAuthBackendRoleId
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/approle_auth_backend_role_id vault_approle_auth_backend_role_id}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/approle_auth_backend_role_id vault_approle_auth_backend_role_id}.
#### Initializers
@@ -386,7 +386,7 @@ The construct id used in the generated config for the DataVaultApproleAuthBacken
The id of the existing DataVaultApproleAuthBackendRoleId that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/approle_auth_backend_role_id#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/approle_auth_backend_role_id#import import section} in the documentation of this resource for the id to use
---
@@ -693,7 +693,7 @@ new DataVaultApproleAuthBackendRoleIdConfig {
| Provisioners
| object[]
| *No description.* |
| RoleName
| string
| Name of the role. |
| Backend
| string
| Unique name of the auth backend to configure. |
-| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/approle_auth_backend_role_id#id DataVaultApproleAuthBackendRoleId#id}. |
+| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/approle_auth_backend_role_id#id DataVaultApproleAuthBackendRoleId#id}. |
| Namespace
| string
| Target namespace. (requires Enterprise). |
---
@@ -778,7 +778,7 @@ public string RoleName { get; set; }
Name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/approle_auth_backend_role_id#role_name DataVaultApproleAuthBackendRoleId#role_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/approle_auth_backend_role_id#role_name DataVaultApproleAuthBackendRoleId#role_name}
---
@@ -792,7 +792,7 @@ public string Backend { get; set; }
Unique name of the auth backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/approle_auth_backend_role_id#backend DataVaultApproleAuthBackendRoleId#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/approle_auth_backend_role_id#backend DataVaultApproleAuthBackendRoleId#backend}
---
@@ -804,7 +804,7 @@ public string Id { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/approle_auth_backend_role_id#id DataVaultApproleAuthBackendRoleId#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/approle_auth_backend_role_id#id DataVaultApproleAuthBackendRoleId#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -821,7 +821,7 @@ public string Namespace { get; set; }
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/approle_auth_backend_role_id#namespace DataVaultApproleAuthBackendRoleId#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/approle_auth_backend_role_id#namespace DataVaultApproleAuthBackendRoleId#namespace}
---
diff --git a/docs/dataVaultApproleAuthBackendRoleId.go.md b/docs/dataVaultApproleAuthBackendRoleId.go.md
index c84c0898..498db9f1 100644
--- a/docs/dataVaultApproleAuthBackendRoleId.go.md
+++ b/docs/dataVaultApproleAuthBackendRoleId.go.md
@@ -4,7 +4,7 @@
### DataVaultApproleAuthBackendRoleId
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/approle_auth_backend_role_id vault_approle_auth_backend_role_id}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/approle_auth_backend_role_id vault_approle_auth_backend_role_id}.
#### Initializers
@@ -386,7 +386,7 @@ The construct id used in the generated config for the DataVaultApproleAuthBacken
The id of the existing DataVaultApproleAuthBackendRoleId that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/approle_auth_backend_role_id#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/approle_auth_backend_role_id#import import section} in the documentation of this resource for the id to use
---
@@ -693,7 +693,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultapproleauthb
| Provisioners
| *[]interface{}
| *No description.* |
| RoleName
| *string
| Name of the role. |
| Backend
| *string
| Unique name of the auth backend to configure. |
-| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/approle_auth_backend_role_id#id DataVaultApproleAuthBackendRoleId#id}. |
+| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/approle_auth_backend_role_id#id DataVaultApproleAuthBackendRoleId#id}. |
| Namespace
| *string
| Target namespace. (requires Enterprise). |
---
@@ -778,7 +778,7 @@ RoleName *string
Name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/approle_auth_backend_role_id#role_name DataVaultApproleAuthBackendRoleId#role_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/approle_auth_backend_role_id#role_name DataVaultApproleAuthBackendRoleId#role_name}
---
@@ -792,7 +792,7 @@ Backend *string
Unique name of the auth backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/approle_auth_backend_role_id#backend DataVaultApproleAuthBackendRoleId#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/approle_auth_backend_role_id#backend DataVaultApproleAuthBackendRoleId#backend}
---
@@ -804,7 +804,7 @@ Id *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/approle_auth_backend_role_id#id DataVaultApproleAuthBackendRoleId#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/approle_auth_backend_role_id#id DataVaultApproleAuthBackendRoleId#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -821,7 +821,7 @@ Namespace *string
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/approle_auth_backend_role_id#namespace DataVaultApproleAuthBackendRoleId#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/approle_auth_backend_role_id#namespace DataVaultApproleAuthBackendRoleId#namespace}
---
diff --git a/docs/dataVaultApproleAuthBackendRoleId.java.md b/docs/dataVaultApproleAuthBackendRoleId.java.md
index 395b7501..df05f0ab 100644
--- a/docs/dataVaultApproleAuthBackendRoleId.java.md
+++ b/docs/dataVaultApproleAuthBackendRoleId.java.md
@@ -4,7 +4,7 @@
### DataVaultApproleAuthBackendRoleId
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/approle_auth_backend_role_id vault_approle_auth_backend_role_id}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/approle_auth_backend_role_id vault_approle_auth_backend_role_id}.
#### Initializers
@@ -43,7 +43,7 @@ DataVaultApproleAuthBackendRoleId.Builder.create(Construct scope, java.lang.Stri
| provisioners
| java.util.List
| *No description.* |
| roleName
| java.lang.String
| Name of the role. |
| backend
| java.lang.String
| Unique name of the auth backend to configure. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/approle_auth_backend_role_id#id DataVaultApproleAuthBackendRoleId#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/approle_auth_backend_role_id#id DataVaultApproleAuthBackendRoleId#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
---
@@ -114,7 +114,7 @@ Must be unique amongst siblings in the same scope
Name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/approle_auth_backend_role_id#role_name DataVaultApproleAuthBackendRoleId#role_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/approle_auth_backend_role_id#role_name DataVaultApproleAuthBackendRoleId#role_name}
---
@@ -124,7 +124,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Unique name of the auth backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/approle_auth_backend_role_id#backend DataVaultApproleAuthBackendRoleId#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/approle_auth_backend_role_id#backend DataVaultApproleAuthBackendRoleId#backend}
---
@@ -132,7 +132,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/approle_auth_backend_role_id#id DataVaultApproleAuthBackendRoleId#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/approle_auth_backend_role_id#id DataVaultApproleAuthBackendRoleId#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -145,7 +145,7 @@ If you experience problems setting this value it might not be settable. Please t
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/approle_auth_backend_role_id#namespace DataVaultApproleAuthBackendRoleId#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/approle_auth_backend_role_id#namespace DataVaultApproleAuthBackendRoleId#namespace}
---
@@ -489,7 +489,7 @@ The construct id used in the generated config for the DataVaultApproleAuthBacken
The id of the existing DataVaultApproleAuthBackendRoleId that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/approle_auth_backend_role_id#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/approle_auth_backend_role_id#import import section} in the documentation of this resource for the id to use
---
@@ -800,7 +800,7 @@ DataVaultApproleAuthBackendRoleIdConfig.builder()
| provisioners
| java.util.List
| *No description.* |
| roleName
| java.lang.String
| Name of the role. |
| backend
| java.lang.String
| Unique name of the auth backend to configure. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/approle_auth_backend_role_id#id DataVaultApproleAuthBackendRoleId#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/approle_auth_backend_role_id#id DataVaultApproleAuthBackendRoleId#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
---
@@ -885,7 +885,7 @@ public java.lang.String getRoleName();
Name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/approle_auth_backend_role_id#role_name DataVaultApproleAuthBackendRoleId#role_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/approle_auth_backend_role_id#role_name DataVaultApproleAuthBackendRoleId#role_name}
---
@@ -899,7 +899,7 @@ public java.lang.String getBackend();
Unique name of the auth backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/approle_auth_backend_role_id#backend DataVaultApproleAuthBackendRoleId#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/approle_auth_backend_role_id#backend DataVaultApproleAuthBackendRoleId#backend}
---
@@ -911,7 +911,7 @@ public java.lang.String getId();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/approle_auth_backend_role_id#id DataVaultApproleAuthBackendRoleId#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/approle_auth_backend_role_id#id DataVaultApproleAuthBackendRoleId#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -928,7 +928,7 @@ public java.lang.String getNamespace();
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/approle_auth_backend_role_id#namespace DataVaultApproleAuthBackendRoleId#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/approle_auth_backend_role_id#namespace DataVaultApproleAuthBackendRoleId#namespace}
---
diff --git a/docs/dataVaultApproleAuthBackendRoleId.python.md b/docs/dataVaultApproleAuthBackendRoleId.python.md
index 0195510c..e0c0d385 100644
--- a/docs/dataVaultApproleAuthBackendRoleId.python.md
+++ b/docs/dataVaultApproleAuthBackendRoleId.python.md
@@ -4,7 +4,7 @@
### DataVaultApproleAuthBackendRoleId
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/approle_auth_backend_role_id vault_approle_auth_backend_role_id}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/approle_auth_backend_role_id vault_approle_auth_backend_role_id}.
#### Initializers
@@ -41,7 +41,7 @@ dataVaultApproleAuthBackendRoleId.DataVaultApproleAuthBackendRoleId(
| provisioners
| typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]]
| *No description.* |
| role_name
| str
| Name of the role. |
| backend
| str
| Unique name of the auth backend to configure. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/approle_auth_backend_role_id#id DataVaultApproleAuthBackendRoleId#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/approle_auth_backend_role_id#id DataVaultApproleAuthBackendRoleId#id}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
---
@@ -112,7 +112,7 @@ Must be unique amongst siblings in the same scope
Name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/approle_auth_backend_role_id#role_name DataVaultApproleAuthBackendRoleId#role_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/approle_auth_backend_role_id#role_name DataVaultApproleAuthBackendRoleId#role_name}
---
@@ -122,7 +122,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Unique name of the auth backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/approle_auth_backend_role_id#backend DataVaultApproleAuthBackendRoleId#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/approle_auth_backend_role_id#backend DataVaultApproleAuthBackendRoleId#backend}
---
@@ -130,7 +130,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/approle_auth_backend_role_id#id DataVaultApproleAuthBackendRoleId#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/approle_auth_backend_role_id#id DataVaultApproleAuthBackendRoleId#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -143,7 +143,7 @@ If you experience problems setting this value it might not be settable. Please t
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/approle_auth_backend_role_id#namespace DataVaultApproleAuthBackendRoleId#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/approle_auth_backend_role_id#namespace DataVaultApproleAuthBackendRoleId#namespace}
---
@@ -523,7 +523,7 @@ The construct id used in the generated config for the DataVaultApproleAuthBacken
The id of the existing DataVaultApproleAuthBackendRoleId that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/approle_auth_backend_role_id#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/approle_auth_backend_role_id#import import section} in the documentation of this resource for the id to use
---
@@ -830,7 +830,7 @@ dataVaultApproleAuthBackendRoleId.DataVaultApproleAuthBackendRoleIdConfig(
| provisioners
| typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]]
| *No description.* |
| role_name
| str
| Name of the role. |
| backend
| str
| Unique name of the auth backend to configure. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/approle_auth_backend_role_id#id DataVaultApproleAuthBackendRoleId#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/approle_auth_backend_role_id#id DataVaultApproleAuthBackendRoleId#id}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
---
@@ -915,7 +915,7 @@ role_name: str
Name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/approle_auth_backend_role_id#role_name DataVaultApproleAuthBackendRoleId#role_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/approle_auth_backend_role_id#role_name DataVaultApproleAuthBackendRoleId#role_name}
---
@@ -929,7 +929,7 @@ backend: str
Unique name of the auth backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/approle_auth_backend_role_id#backend DataVaultApproleAuthBackendRoleId#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/approle_auth_backend_role_id#backend DataVaultApproleAuthBackendRoleId#backend}
---
@@ -941,7 +941,7 @@ id: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/approle_auth_backend_role_id#id DataVaultApproleAuthBackendRoleId#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/approle_auth_backend_role_id#id DataVaultApproleAuthBackendRoleId#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -958,7 +958,7 @@ namespace: str
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/approle_auth_backend_role_id#namespace DataVaultApproleAuthBackendRoleId#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/approle_auth_backend_role_id#namespace DataVaultApproleAuthBackendRoleId#namespace}
---
diff --git a/docs/dataVaultApproleAuthBackendRoleId.typescript.md b/docs/dataVaultApproleAuthBackendRoleId.typescript.md
index 7ffe476a..1d9d3e9b 100644
--- a/docs/dataVaultApproleAuthBackendRoleId.typescript.md
+++ b/docs/dataVaultApproleAuthBackendRoleId.typescript.md
@@ -4,7 +4,7 @@
### DataVaultApproleAuthBackendRoleId
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/approle_auth_backend_role_id vault_approle_auth_backend_role_id}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/approle_auth_backend_role_id vault_approle_auth_backend_role_id}.
#### Initializers
@@ -386,7 +386,7 @@ The construct id used in the generated config for the DataVaultApproleAuthBacken
The id of the existing DataVaultApproleAuthBackendRoleId that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/approle_auth_backend_role_id#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/approle_auth_backend_role_id#import import section} in the documentation of this resource for the id to use
---
@@ -681,7 +681,7 @@ const dataVaultApproleAuthBackendRoleIdConfig: dataVaultApproleAuthBackendRoleId
| provisioners
| cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[]
| *No description.* |
| roleName
| string
| Name of the role. |
| backend
| string
| Unique name of the auth backend to configure. |
-| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/approle_auth_backend_role_id#id DataVaultApproleAuthBackendRoleId#id}. |
+| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/approle_auth_backend_role_id#id DataVaultApproleAuthBackendRoleId#id}. |
| namespace
| string
| Target namespace. (requires Enterprise). |
---
@@ -766,7 +766,7 @@ public readonly roleName: string;
Name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/approle_auth_backend_role_id#role_name DataVaultApproleAuthBackendRoleId#role_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/approle_auth_backend_role_id#role_name DataVaultApproleAuthBackendRoleId#role_name}
---
@@ -780,7 +780,7 @@ public readonly backend: string;
Unique name of the auth backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/approle_auth_backend_role_id#backend DataVaultApproleAuthBackendRoleId#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/approle_auth_backend_role_id#backend DataVaultApproleAuthBackendRoleId#backend}
---
@@ -792,7 +792,7 @@ public readonly id: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/approle_auth_backend_role_id#id DataVaultApproleAuthBackendRoleId#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/approle_auth_backend_role_id#id DataVaultApproleAuthBackendRoleId#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -809,7 +809,7 @@ public readonly namespace: string;
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/approle_auth_backend_role_id#namespace DataVaultApproleAuthBackendRoleId#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/approle_auth_backend_role_id#namespace DataVaultApproleAuthBackendRoleId#namespace}
---
diff --git a/docs/dataVaultAuthBackend.csharp.md b/docs/dataVaultAuthBackend.csharp.md
index 5a7b0db6..dd0bf810 100644
--- a/docs/dataVaultAuthBackend.csharp.md
+++ b/docs/dataVaultAuthBackend.csharp.md
@@ -4,7 +4,7 @@
### DataVaultAuthBackend
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backend vault_auth_backend}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backend vault_auth_backend}.
#### Initializers
@@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultAuthBackend to im
The id of the existing DataVaultAuthBackend that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backend#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backend#import import section} in the documentation of this resource for the id to use
---
@@ -728,7 +728,7 @@ new DataVaultAuthBackendConfig {
| Provider
| HashiCorp.Cdktf.TerraformProvider
| *No description.* |
| Provisioners
| object[]
| *No description.* |
| Path
| string
| The auth backend mount point. |
-| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backend#id DataVaultAuthBackend#id}. |
+| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backend#id DataVaultAuthBackend#id}. |
| Namespace
| string
| Target namespace. (requires Enterprise). |
---
@@ -813,7 +813,7 @@ public string Path { get; set; }
The auth backend mount point.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backend#path DataVaultAuthBackend#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backend#path DataVaultAuthBackend#path}
---
@@ -825,7 +825,7 @@ public string Id { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backend#id DataVaultAuthBackend#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backend#id DataVaultAuthBackend#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -842,7 +842,7 @@ public string Namespace { get; set; }
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backend#namespace DataVaultAuthBackend#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backend#namespace DataVaultAuthBackend#namespace}
---
diff --git a/docs/dataVaultAuthBackend.go.md b/docs/dataVaultAuthBackend.go.md
index 4d69ddb3..b6536d87 100644
--- a/docs/dataVaultAuthBackend.go.md
+++ b/docs/dataVaultAuthBackend.go.md
@@ -4,7 +4,7 @@
### DataVaultAuthBackend
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backend vault_auth_backend}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backend vault_auth_backend}.
#### Initializers
@@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultAuthBackend to im
The id of the existing DataVaultAuthBackend that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backend#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backend#import import section} in the documentation of this resource for the id to use
---
@@ -728,7 +728,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultauthbackend"
| Provider
| github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProvider
| *No description.* |
| Provisioners
| *[]interface{}
| *No description.* |
| Path
| *string
| The auth backend mount point. |
-| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backend#id DataVaultAuthBackend#id}. |
+| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backend#id DataVaultAuthBackend#id}. |
| Namespace
| *string
| Target namespace. (requires Enterprise). |
---
@@ -813,7 +813,7 @@ Path *string
The auth backend mount point.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backend#path DataVaultAuthBackend#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backend#path DataVaultAuthBackend#path}
---
@@ -825,7 +825,7 @@ Id *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backend#id DataVaultAuthBackend#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backend#id DataVaultAuthBackend#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -842,7 +842,7 @@ Namespace *string
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backend#namespace DataVaultAuthBackend#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backend#namespace DataVaultAuthBackend#namespace}
---
diff --git a/docs/dataVaultAuthBackend.java.md b/docs/dataVaultAuthBackend.java.md
index a83d2dd6..1580d690 100644
--- a/docs/dataVaultAuthBackend.java.md
+++ b/docs/dataVaultAuthBackend.java.md
@@ -4,7 +4,7 @@
### DataVaultAuthBackend
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backend vault_auth_backend}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backend vault_auth_backend}.
#### Initializers
@@ -41,7 +41,7 @@ DataVaultAuthBackend.Builder.create(Construct scope, java.lang.String id)
| provider
| com.hashicorp.cdktf.TerraformProvider
| *No description.* |
| provisioners
| java.util.List
| *No description.* |
| path
| java.lang.String
| The auth backend mount point. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backend#id DataVaultAuthBackend#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backend#id DataVaultAuthBackend#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
---
@@ -112,7 +112,7 @@ Must be unique amongst siblings in the same scope
The auth backend mount point.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backend#path DataVaultAuthBackend#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backend#path DataVaultAuthBackend#path}
---
@@ -120,7 +120,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backend#id DataVaultAuthBackend#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backend#id DataVaultAuthBackend#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -133,7 +133,7 @@ If you experience problems setting this value it might not be settable. Please t
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backend#namespace DataVaultAuthBackend#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backend#namespace DataVaultAuthBackend#namespace}
---
@@ -470,7 +470,7 @@ The construct id used in the generated config for the DataVaultAuthBackend to im
The id of the existing DataVaultAuthBackend that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backend#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backend#import import section} in the documentation of this resource for the id to use
---
@@ -823,7 +823,7 @@ DataVaultAuthBackendConfig.builder()
| provider
| com.hashicorp.cdktf.TerraformProvider
| *No description.* |
| provisioners
| java.util.List
| *No description.* |
| path
| java.lang.String
| The auth backend mount point. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backend#id DataVaultAuthBackend#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backend#id DataVaultAuthBackend#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
---
@@ -908,7 +908,7 @@ public java.lang.String getPath();
The auth backend mount point.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backend#path DataVaultAuthBackend#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backend#path DataVaultAuthBackend#path}
---
@@ -920,7 +920,7 @@ public java.lang.String getId();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backend#id DataVaultAuthBackend#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backend#id DataVaultAuthBackend#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -937,7 +937,7 @@ public java.lang.String getNamespace();
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backend#namespace DataVaultAuthBackend#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backend#namespace DataVaultAuthBackend#namespace}
---
diff --git a/docs/dataVaultAuthBackend.python.md b/docs/dataVaultAuthBackend.python.md
index 886467d2..a2a809dc 100644
--- a/docs/dataVaultAuthBackend.python.md
+++ b/docs/dataVaultAuthBackend.python.md
@@ -4,7 +4,7 @@
### DataVaultAuthBackend
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backend vault_auth_backend}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backend vault_auth_backend}.
#### Initializers
@@ -39,7 +39,7 @@ dataVaultAuthBackend.DataVaultAuthBackend(
| provider
| cdktf.TerraformProvider
| *No description.* |
| provisioners
| typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]]
| *No description.* |
| path
| str
| The auth backend mount point. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backend#id DataVaultAuthBackend#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backend#id DataVaultAuthBackend#id}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
---
@@ -110,7 +110,7 @@ Must be unique amongst siblings in the same scope
The auth backend mount point.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backend#path DataVaultAuthBackend#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backend#path DataVaultAuthBackend#path}
---
@@ -118,7 +118,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backend#id DataVaultAuthBackend#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backend#id DataVaultAuthBackend#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -131,7 +131,7 @@ If you experience problems setting this value it might not be settable. Please t
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backend#namespace DataVaultAuthBackend#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backend#namespace DataVaultAuthBackend#namespace}
---
@@ -504,7 +504,7 @@ The construct id used in the generated config for the DataVaultAuthBackend to im
The id of the existing DataVaultAuthBackend that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backend#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backend#import import section} in the documentation of this resource for the id to use
---
@@ -853,7 +853,7 @@ dataVaultAuthBackend.DataVaultAuthBackendConfig(
| provider
| cdktf.TerraformProvider
| *No description.* |
| provisioners
| typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]]
| *No description.* |
| path
| str
| The auth backend mount point. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backend#id DataVaultAuthBackend#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backend#id DataVaultAuthBackend#id}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
---
@@ -938,7 +938,7 @@ path: str
The auth backend mount point.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backend#path DataVaultAuthBackend#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backend#path DataVaultAuthBackend#path}
---
@@ -950,7 +950,7 @@ id: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backend#id DataVaultAuthBackend#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backend#id DataVaultAuthBackend#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -967,7 +967,7 @@ namespace: str
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backend#namespace DataVaultAuthBackend#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backend#namespace DataVaultAuthBackend#namespace}
---
diff --git a/docs/dataVaultAuthBackend.typescript.md b/docs/dataVaultAuthBackend.typescript.md
index 34e93868..29d2541c 100644
--- a/docs/dataVaultAuthBackend.typescript.md
+++ b/docs/dataVaultAuthBackend.typescript.md
@@ -4,7 +4,7 @@
### DataVaultAuthBackend
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backend vault_auth_backend}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backend vault_auth_backend}.
#### Initializers
@@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultAuthBackend to im
The id of the existing DataVaultAuthBackend that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backend#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backend#import import section} in the documentation of this resource for the id to use
---
@@ -717,7 +717,7 @@ const dataVaultAuthBackendConfig: dataVaultAuthBackend.DataVaultAuthBackendConfi
| provider
| cdktf.TerraformProvider
| *No description.* |
| provisioners
| cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[]
| *No description.* |
| path
| string
| The auth backend mount point. |
-| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backend#id DataVaultAuthBackend#id}. |
+| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backend#id DataVaultAuthBackend#id}. |
| namespace
| string
| Target namespace. (requires Enterprise). |
---
@@ -802,7 +802,7 @@ public readonly path: string;
The auth backend mount point.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backend#path DataVaultAuthBackend#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backend#path DataVaultAuthBackend#path}
---
@@ -814,7 +814,7 @@ public readonly id: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backend#id DataVaultAuthBackend#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backend#id DataVaultAuthBackend#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -831,7 +831,7 @@ public readonly namespace: string;
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backend#namespace DataVaultAuthBackend#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backend#namespace DataVaultAuthBackend#namespace}
---
diff --git a/docs/dataVaultAuthBackends.csharp.md b/docs/dataVaultAuthBackends.csharp.md
index ed119c9b..588739d4 100644
--- a/docs/dataVaultAuthBackends.csharp.md
+++ b/docs/dataVaultAuthBackends.csharp.md
@@ -4,7 +4,7 @@
### DataVaultAuthBackends
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backends vault_auth_backends}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backends vault_auth_backends}.
#### Initializers
@@ -386,7 +386,7 @@ The construct id used in the generated config for the DataVaultAuthBackends to i
The id of the existing DataVaultAuthBackends that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backends#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backends#import import section} in the documentation of this resource for the id to use
---
@@ -679,7 +679,7 @@ new DataVaultAuthBackendsConfig {
| Lifecycle
| HashiCorp.Cdktf.TerraformResourceLifecycle
| *No description.* |
| Provider
| HashiCorp.Cdktf.TerraformProvider
| *No description.* |
| Provisioners
| object[]
| *No description.* |
-| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backends#id DataVaultAuthBackends#id}. |
+| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backends#id DataVaultAuthBackends#id}. |
| Namespace
| string
| Target namespace. (requires Enterprise). |
| Type
| string
| The type of the auth backend. |
@@ -763,7 +763,7 @@ public string Id { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backends#id DataVaultAuthBackends#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backends#id DataVaultAuthBackends#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -780,7 +780,7 @@ public string Namespace { get; set; }
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backends#namespace DataVaultAuthBackends#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backends#namespace DataVaultAuthBackends#namespace}
---
@@ -794,7 +794,7 @@ public string Type { get; set; }
The type of the auth backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backends#type DataVaultAuthBackends#type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backends#type DataVaultAuthBackends#type}
---
diff --git a/docs/dataVaultAuthBackends.go.md b/docs/dataVaultAuthBackends.go.md
index ba8d7cd7..a9cf63ba 100644
--- a/docs/dataVaultAuthBackends.go.md
+++ b/docs/dataVaultAuthBackends.go.md
@@ -4,7 +4,7 @@
### DataVaultAuthBackends
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backends vault_auth_backends}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backends vault_auth_backends}.
#### Initializers
@@ -386,7 +386,7 @@ The construct id used in the generated config for the DataVaultAuthBackends to i
The id of the existing DataVaultAuthBackends that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backends#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backends#import import section} in the documentation of this resource for the id to use
---
@@ -679,7 +679,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultauthbackends
| Lifecycle
| github.com/hashicorp/terraform-cdk-go/cdktf.TerraformResourceLifecycle
| *No description.* |
| Provider
| github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProvider
| *No description.* |
| Provisioners
| *[]interface{}
| *No description.* |
-| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backends#id DataVaultAuthBackends#id}. |
+| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backends#id DataVaultAuthBackends#id}. |
| Namespace
| *string
| Target namespace. (requires Enterprise). |
| Type
| *string
| The type of the auth backend. |
@@ -763,7 +763,7 @@ Id *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backends#id DataVaultAuthBackends#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backends#id DataVaultAuthBackends#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -780,7 +780,7 @@ Namespace *string
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backends#namespace DataVaultAuthBackends#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backends#namespace DataVaultAuthBackends#namespace}
---
@@ -794,7 +794,7 @@ Type *string
The type of the auth backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backends#type DataVaultAuthBackends#type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backends#type DataVaultAuthBackends#type}
---
diff --git a/docs/dataVaultAuthBackends.java.md b/docs/dataVaultAuthBackends.java.md
index bd82992e..fa66b16b 100644
--- a/docs/dataVaultAuthBackends.java.md
+++ b/docs/dataVaultAuthBackends.java.md
@@ -4,7 +4,7 @@
### DataVaultAuthBackends
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backends vault_auth_backends}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backends vault_auth_backends}.
#### Initializers
@@ -40,7 +40,7 @@ DataVaultAuthBackends.Builder.create(Construct scope, java.lang.String id)
| lifecycle
| com.hashicorp.cdktf.TerraformResourceLifecycle
| *No description.* |
| provider
| com.hashicorp.cdktf.TerraformProvider
| *No description.* |
| provisioners
| java.util.List
| *No description.* |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backends#id DataVaultAuthBackends#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backends#id DataVaultAuthBackends#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
| type
| java.lang.String
| The type of the auth backend. |
@@ -110,7 +110,7 @@ Must be unique amongst siblings in the same scope
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backends#id DataVaultAuthBackends#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backends#id DataVaultAuthBackends#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -123,7 +123,7 @@ If you experience problems setting this value it might not be settable. Please t
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backends#namespace DataVaultAuthBackends#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backends#namespace DataVaultAuthBackends#namespace}
---
@@ -133,7 +133,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The type of the auth backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backends#type DataVaultAuthBackends#type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backends#type DataVaultAuthBackends#type}
---
@@ -477,7 +477,7 @@ The construct id used in the generated config for the DataVaultAuthBackends to i
The id of the existing DataVaultAuthBackends that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backends#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backends#import import section} in the documentation of this resource for the id to use
---
@@ -774,7 +774,7 @@ DataVaultAuthBackendsConfig.builder()
| lifecycle
| com.hashicorp.cdktf.TerraformResourceLifecycle
| *No description.* |
| provider
| com.hashicorp.cdktf.TerraformProvider
| *No description.* |
| provisioners
| java.util.List
| *No description.* |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backends#id DataVaultAuthBackends#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backends#id DataVaultAuthBackends#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
| type
| java.lang.String
| The type of the auth backend. |
@@ -858,7 +858,7 @@ public java.lang.String getId();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backends#id DataVaultAuthBackends#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backends#id DataVaultAuthBackends#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -875,7 +875,7 @@ public java.lang.String getNamespace();
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backends#namespace DataVaultAuthBackends#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backends#namespace DataVaultAuthBackends#namespace}
---
@@ -889,7 +889,7 @@ public java.lang.String getType();
The type of the auth backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backends#type DataVaultAuthBackends#type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backends#type DataVaultAuthBackends#type}
---
diff --git a/docs/dataVaultAuthBackends.python.md b/docs/dataVaultAuthBackends.python.md
index aab3ae67..17051223 100644
--- a/docs/dataVaultAuthBackends.python.md
+++ b/docs/dataVaultAuthBackends.python.md
@@ -4,7 +4,7 @@
### DataVaultAuthBackends
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backends vault_auth_backends}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backends vault_auth_backends}.
#### Initializers
@@ -38,7 +38,7 @@ dataVaultAuthBackends.DataVaultAuthBackends(
| lifecycle
| cdktf.TerraformResourceLifecycle
| *No description.* |
| provider
| cdktf.TerraformProvider
| *No description.* |
| provisioners
| typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]]
| *No description.* |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backends#id DataVaultAuthBackends#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backends#id DataVaultAuthBackends#id}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
| type
| str
| The type of the auth backend. |
@@ -108,7 +108,7 @@ Must be unique amongst siblings in the same scope
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backends#id DataVaultAuthBackends#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backends#id DataVaultAuthBackends#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -121,7 +121,7 @@ If you experience problems setting this value it might not be settable. Please t
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backends#namespace DataVaultAuthBackends#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backends#namespace DataVaultAuthBackends#namespace}
---
@@ -131,7 +131,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The type of the auth backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backends#type DataVaultAuthBackends#type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backends#type DataVaultAuthBackends#type}
---
@@ -511,7 +511,7 @@ The construct id used in the generated config for the DataVaultAuthBackends to i
The id of the existing DataVaultAuthBackends that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backends#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backends#import import section} in the documentation of this resource for the id to use
---
@@ -804,7 +804,7 @@ dataVaultAuthBackends.DataVaultAuthBackendsConfig(
| lifecycle
| cdktf.TerraformResourceLifecycle
| *No description.* |
| provider
| cdktf.TerraformProvider
| *No description.* |
| provisioners
| typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]]
| *No description.* |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backends#id DataVaultAuthBackends#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backends#id DataVaultAuthBackends#id}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
| type
| str
| The type of the auth backend. |
@@ -888,7 +888,7 @@ id: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backends#id DataVaultAuthBackends#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backends#id DataVaultAuthBackends#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -905,7 +905,7 @@ namespace: str
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backends#namespace DataVaultAuthBackends#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backends#namespace DataVaultAuthBackends#namespace}
---
@@ -919,7 +919,7 @@ type: str
The type of the auth backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backends#type DataVaultAuthBackends#type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backends#type DataVaultAuthBackends#type}
---
diff --git a/docs/dataVaultAuthBackends.typescript.md b/docs/dataVaultAuthBackends.typescript.md
index d513a821..6f030629 100644
--- a/docs/dataVaultAuthBackends.typescript.md
+++ b/docs/dataVaultAuthBackends.typescript.md
@@ -4,7 +4,7 @@
### DataVaultAuthBackends
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backends vault_auth_backends}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backends vault_auth_backends}.
#### Initializers
@@ -386,7 +386,7 @@ The construct id used in the generated config for the DataVaultAuthBackends to i
The id of the existing DataVaultAuthBackends that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backends#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backends#import import section} in the documentation of this resource for the id to use
---
@@ -668,7 +668,7 @@ const dataVaultAuthBackendsConfig: dataVaultAuthBackends.DataVaultAuthBackendsCo
| lifecycle
| cdktf.TerraformResourceLifecycle
| *No description.* |
| provider
| cdktf.TerraformProvider
| *No description.* |
| provisioners
| cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[]
| *No description.* |
-| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backends#id DataVaultAuthBackends#id}. |
+| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backends#id DataVaultAuthBackends#id}. |
| namespace
| string
| Target namespace. (requires Enterprise). |
| type
| string
| The type of the auth backend. |
@@ -752,7 +752,7 @@ public readonly id: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backends#id DataVaultAuthBackends#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backends#id DataVaultAuthBackends#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -769,7 +769,7 @@ public readonly namespace: string;
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backends#namespace DataVaultAuthBackends#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backends#namespace DataVaultAuthBackends#namespace}
---
@@ -783,7 +783,7 @@ public readonly type: string;
The type of the auth backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backends#type DataVaultAuthBackends#type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backends#type DataVaultAuthBackends#type}
---
diff --git a/docs/dataVaultAwsAccessCredentials.csharp.md b/docs/dataVaultAwsAccessCredentials.csharp.md
index be5d2105..c5bda217 100644
--- a/docs/dataVaultAwsAccessCredentials.csharp.md
+++ b/docs/dataVaultAwsAccessCredentials.csharp.md
@@ -4,7 +4,7 @@
### DataVaultAwsAccessCredentials
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials vault_aws_access_credentials}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials vault_aws_access_credentials}.
#### Initializers
@@ -407,7 +407,7 @@ The construct id used in the generated config for the DataVaultAwsAccessCredenti
The id of the existing DataVaultAwsAccessCredentials that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#import import section} in the documentation of this resource for the id to use
---
@@ -872,7 +872,7 @@ new DataVaultAwsAccessCredentialsConfig {
| Provisioners
| object[]
| *No description.* |
| Backend
| string
| AWS Secret Backend to read credentials from. |
| Role
| string
| AWS Secret Role to read credentials from. |
-| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#id DataVaultAwsAccessCredentials#id}. |
+| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#id DataVaultAwsAccessCredentials#id}. |
| Namespace
| string
| Target namespace. (requires Enterprise). |
| Region
| string
| Region the read credentials belong to. |
| RoleArn
| string
| ARN to use if multiple are available in the role. Required if the role has multiple ARNs. |
@@ -961,7 +961,7 @@ public string Backend { get; set; }
AWS Secret Backend to read credentials from.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#backend DataVaultAwsAccessCredentials#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#backend DataVaultAwsAccessCredentials#backend}
---
@@ -975,7 +975,7 @@ public string Role { get; set; }
AWS Secret Role to read credentials from.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#role DataVaultAwsAccessCredentials#role}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#role DataVaultAwsAccessCredentials#role}
---
@@ -987,7 +987,7 @@ public string Id { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#id DataVaultAwsAccessCredentials#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#id DataVaultAwsAccessCredentials#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1004,7 +1004,7 @@ public string Namespace { get; set; }
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#namespace DataVaultAwsAccessCredentials#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#namespace DataVaultAwsAccessCredentials#namespace}
---
@@ -1018,7 +1018,7 @@ public string Region { get; set; }
Region the read credentials belong to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#region DataVaultAwsAccessCredentials#region}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#region DataVaultAwsAccessCredentials#region}
---
@@ -1032,7 +1032,7 @@ public string RoleArn { get; set; }
ARN to use if multiple are available in the role. Required if the role has multiple ARNs.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#role_arn DataVaultAwsAccessCredentials#role_arn}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#role_arn DataVaultAwsAccessCredentials#role_arn}
---
@@ -1046,7 +1046,7 @@ public string Ttl { get; set; }
User specified Time-To-Live for the STS token. Uses the Role defined default_sts_ttl when not specified.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#ttl DataVaultAwsAccessCredentials#ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#ttl DataVaultAwsAccessCredentials#ttl}
---
@@ -1060,7 +1060,7 @@ public string Type { get; set; }
Type of credentials to read. Must be either 'creds' for Access Key and Secret Key, or 'sts' for STS.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#type DataVaultAwsAccessCredentials#type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#type DataVaultAwsAccessCredentials#type}
---
diff --git a/docs/dataVaultAwsAccessCredentials.go.md b/docs/dataVaultAwsAccessCredentials.go.md
index 6dd3a0ec..4b502cdf 100644
--- a/docs/dataVaultAwsAccessCredentials.go.md
+++ b/docs/dataVaultAwsAccessCredentials.go.md
@@ -4,7 +4,7 @@
### DataVaultAwsAccessCredentials
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials vault_aws_access_credentials}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials vault_aws_access_credentials}.
#### Initializers
@@ -407,7 +407,7 @@ The construct id used in the generated config for the DataVaultAwsAccessCredenti
The id of the existing DataVaultAwsAccessCredentials that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#import import section} in the documentation of this resource for the id to use
---
@@ -872,7 +872,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultawsaccesscre
| Provisioners
| *[]interface{}
| *No description.* |
| Backend
| *string
| AWS Secret Backend to read credentials from. |
| Role
| *string
| AWS Secret Role to read credentials from. |
-| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#id DataVaultAwsAccessCredentials#id}. |
+| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#id DataVaultAwsAccessCredentials#id}. |
| Namespace
| *string
| Target namespace. (requires Enterprise). |
| Region
| *string
| Region the read credentials belong to. |
| RoleArn
| *string
| ARN to use if multiple are available in the role. Required if the role has multiple ARNs. |
@@ -961,7 +961,7 @@ Backend *string
AWS Secret Backend to read credentials from.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#backend DataVaultAwsAccessCredentials#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#backend DataVaultAwsAccessCredentials#backend}
---
@@ -975,7 +975,7 @@ Role *string
AWS Secret Role to read credentials from.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#role DataVaultAwsAccessCredentials#role}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#role DataVaultAwsAccessCredentials#role}
---
@@ -987,7 +987,7 @@ Id *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#id DataVaultAwsAccessCredentials#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#id DataVaultAwsAccessCredentials#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1004,7 +1004,7 @@ Namespace *string
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#namespace DataVaultAwsAccessCredentials#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#namespace DataVaultAwsAccessCredentials#namespace}
---
@@ -1018,7 +1018,7 @@ Region *string
Region the read credentials belong to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#region DataVaultAwsAccessCredentials#region}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#region DataVaultAwsAccessCredentials#region}
---
@@ -1032,7 +1032,7 @@ RoleArn *string
ARN to use if multiple are available in the role. Required if the role has multiple ARNs.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#role_arn DataVaultAwsAccessCredentials#role_arn}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#role_arn DataVaultAwsAccessCredentials#role_arn}
---
@@ -1046,7 +1046,7 @@ Ttl *string
User specified Time-To-Live for the STS token. Uses the Role defined default_sts_ttl when not specified.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#ttl DataVaultAwsAccessCredentials#ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#ttl DataVaultAwsAccessCredentials#ttl}
---
@@ -1060,7 +1060,7 @@ Type *string
Type of credentials to read. Must be either 'creds' for Access Key and Secret Key, or 'sts' for STS.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#type DataVaultAwsAccessCredentials#type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#type DataVaultAwsAccessCredentials#type}
---
diff --git a/docs/dataVaultAwsAccessCredentials.java.md b/docs/dataVaultAwsAccessCredentials.java.md
index 9bb75b7e..307482cd 100644
--- a/docs/dataVaultAwsAccessCredentials.java.md
+++ b/docs/dataVaultAwsAccessCredentials.java.md
@@ -4,7 +4,7 @@
### DataVaultAwsAccessCredentials
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials vault_aws_access_credentials}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials vault_aws_access_credentials}.
#### Initializers
@@ -47,7 +47,7 @@ DataVaultAwsAccessCredentials.Builder.create(Construct scope, java.lang.String i
| provisioners
| java.util.List
| *No description.* |
| backend
| java.lang.String
| AWS Secret Backend to read credentials from. |
| role
| java.lang.String
| AWS Secret Role to read credentials from. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#id DataVaultAwsAccessCredentials#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#id DataVaultAwsAccessCredentials#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
| region
| java.lang.String
| Region the read credentials belong to. |
| roleArn
| java.lang.String
| ARN to use if multiple are available in the role. Required if the role has multiple ARNs. |
@@ -122,7 +122,7 @@ Must be unique amongst siblings in the same scope
AWS Secret Backend to read credentials from.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#backend DataVaultAwsAccessCredentials#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#backend DataVaultAwsAccessCredentials#backend}
---
@@ -132,7 +132,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
AWS Secret Role to read credentials from.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#role DataVaultAwsAccessCredentials#role}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#role DataVaultAwsAccessCredentials#role}
---
@@ -140,7 +140,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#id DataVaultAwsAccessCredentials#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#id DataVaultAwsAccessCredentials#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -153,7 +153,7 @@ If you experience problems setting this value it might not be settable. Please t
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#namespace DataVaultAwsAccessCredentials#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#namespace DataVaultAwsAccessCredentials#namespace}
---
@@ -163,7 +163,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Region the read credentials belong to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#region DataVaultAwsAccessCredentials#region}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#region DataVaultAwsAccessCredentials#region}
---
@@ -173,7 +173,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
ARN to use if multiple are available in the role. Required if the role has multiple ARNs.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#role_arn DataVaultAwsAccessCredentials#role_arn}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#role_arn DataVaultAwsAccessCredentials#role_arn}
---
@@ -183,7 +183,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
User specified Time-To-Live for the STS token. Uses the Role defined default_sts_ttl when not specified.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#ttl DataVaultAwsAccessCredentials#ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#ttl DataVaultAwsAccessCredentials#ttl}
---
@@ -193,7 +193,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Type of credentials to read. Must be either 'creds' for Access Key and Secret Key, or 'sts' for STS.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#type DataVaultAwsAccessCredentials#type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#type DataVaultAwsAccessCredentials#type}
---
@@ -558,7 +558,7 @@ The construct id used in the generated config for the DataVaultAwsAccessCredenti
The id of the existing DataVaultAwsAccessCredentials that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#import import section} in the documentation of this resource for the id to use
---
@@ -1027,7 +1027,7 @@ DataVaultAwsAccessCredentialsConfig.builder()
| provisioners
| java.util.List
| *No description.* |
| backend
| java.lang.String
| AWS Secret Backend to read credentials from. |
| role
| java.lang.String
| AWS Secret Role to read credentials from. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#id DataVaultAwsAccessCredentials#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#id DataVaultAwsAccessCredentials#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
| region
| java.lang.String
| Region the read credentials belong to. |
| roleArn
| java.lang.String
| ARN to use if multiple are available in the role. Required if the role has multiple ARNs. |
@@ -1116,7 +1116,7 @@ public java.lang.String getBackend();
AWS Secret Backend to read credentials from.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#backend DataVaultAwsAccessCredentials#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#backend DataVaultAwsAccessCredentials#backend}
---
@@ -1130,7 +1130,7 @@ public java.lang.String getRole();
AWS Secret Role to read credentials from.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#role DataVaultAwsAccessCredentials#role}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#role DataVaultAwsAccessCredentials#role}
---
@@ -1142,7 +1142,7 @@ public java.lang.String getId();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#id DataVaultAwsAccessCredentials#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#id DataVaultAwsAccessCredentials#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1159,7 +1159,7 @@ public java.lang.String getNamespace();
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#namespace DataVaultAwsAccessCredentials#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#namespace DataVaultAwsAccessCredentials#namespace}
---
@@ -1173,7 +1173,7 @@ public java.lang.String getRegion();
Region the read credentials belong to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#region DataVaultAwsAccessCredentials#region}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#region DataVaultAwsAccessCredentials#region}
---
@@ -1187,7 +1187,7 @@ public java.lang.String getRoleArn();
ARN to use if multiple are available in the role. Required if the role has multiple ARNs.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#role_arn DataVaultAwsAccessCredentials#role_arn}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#role_arn DataVaultAwsAccessCredentials#role_arn}
---
@@ -1201,7 +1201,7 @@ public java.lang.String getTtl();
User specified Time-To-Live for the STS token. Uses the Role defined default_sts_ttl when not specified.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#ttl DataVaultAwsAccessCredentials#ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#ttl DataVaultAwsAccessCredentials#ttl}
---
@@ -1215,7 +1215,7 @@ public java.lang.String getType();
Type of credentials to read. Must be either 'creds' for Access Key and Secret Key, or 'sts' for STS.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#type DataVaultAwsAccessCredentials#type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#type DataVaultAwsAccessCredentials#type}
---
diff --git a/docs/dataVaultAwsAccessCredentials.python.md b/docs/dataVaultAwsAccessCredentials.python.md
index cac9e664..ab7801c8 100644
--- a/docs/dataVaultAwsAccessCredentials.python.md
+++ b/docs/dataVaultAwsAccessCredentials.python.md
@@ -4,7 +4,7 @@
### DataVaultAwsAccessCredentials
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials vault_aws_access_credentials}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials vault_aws_access_credentials}.
#### Initializers
@@ -45,7 +45,7 @@ dataVaultAwsAccessCredentials.DataVaultAwsAccessCredentials(
| provisioners
| typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]]
| *No description.* |
| backend
| str
| AWS Secret Backend to read credentials from. |
| role
| str
| AWS Secret Role to read credentials from. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#id DataVaultAwsAccessCredentials#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#id DataVaultAwsAccessCredentials#id}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
| region
| str
| Region the read credentials belong to. |
| role_arn
| str
| ARN to use if multiple are available in the role. Required if the role has multiple ARNs. |
@@ -120,7 +120,7 @@ Must be unique amongst siblings in the same scope
AWS Secret Backend to read credentials from.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#backend DataVaultAwsAccessCredentials#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#backend DataVaultAwsAccessCredentials#backend}
---
@@ -130,7 +130,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
AWS Secret Role to read credentials from.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#role DataVaultAwsAccessCredentials#role}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#role DataVaultAwsAccessCredentials#role}
---
@@ -138,7 +138,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#id DataVaultAwsAccessCredentials#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#id DataVaultAwsAccessCredentials#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -151,7 +151,7 @@ If you experience problems setting this value it might not be settable. Please t
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#namespace DataVaultAwsAccessCredentials#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#namespace DataVaultAwsAccessCredentials#namespace}
---
@@ -161,7 +161,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Region the read credentials belong to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#region DataVaultAwsAccessCredentials#region}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#region DataVaultAwsAccessCredentials#region}
---
@@ -171,7 +171,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
ARN to use if multiple are available in the role. Required if the role has multiple ARNs.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#role_arn DataVaultAwsAccessCredentials#role_arn}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#role_arn DataVaultAwsAccessCredentials#role_arn}
---
@@ -181,7 +181,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
User specified Time-To-Live for the STS token. Uses the Role defined default_sts_ttl when not specified.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#ttl DataVaultAwsAccessCredentials#ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#ttl DataVaultAwsAccessCredentials#ttl}
---
@@ -191,7 +191,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Type of credentials to read. Must be either 'creds' for Access Key and Secret Key, or 'sts' for STS.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#type DataVaultAwsAccessCredentials#type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#type DataVaultAwsAccessCredentials#type}
---
@@ -592,7 +592,7 @@ The construct id used in the generated config for the DataVaultAwsAccessCredenti
The id of the existing DataVaultAwsAccessCredentials that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#import import section} in the documentation of this resource for the id to use
---
@@ -1057,7 +1057,7 @@ dataVaultAwsAccessCredentials.DataVaultAwsAccessCredentialsConfig(
| provisioners
| typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]]
| *No description.* |
| backend
| str
| AWS Secret Backend to read credentials from. |
| role
| str
| AWS Secret Role to read credentials from. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#id DataVaultAwsAccessCredentials#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#id DataVaultAwsAccessCredentials#id}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
| region
| str
| Region the read credentials belong to. |
| role_arn
| str
| ARN to use if multiple are available in the role. Required if the role has multiple ARNs. |
@@ -1146,7 +1146,7 @@ backend: str
AWS Secret Backend to read credentials from.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#backend DataVaultAwsAccessCredentials#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#backend DataVaultAwsAccessCredentials#backend}
---
@@ -1160,7 +1160,7 @@ role: str
AWS Secret Role to read credentials from.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#role DataVaultAwsAccessCredentials#role}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#role DataVaultAwsAccessCredentials#role}
---
@@ -1172,7 +1172,7 @@ id: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#id DataVaultAwsAccessCredentials#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#id DataVaultAwsAccessCredentials#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1189,7 +1189,7 @@ namespace: str
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#namespace DataVaultAwsAccessCredentials#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#namespace DataVaultAwsAccessCredentials#namespace}
---
@@ -1203,7 +1203,7 @@ region: str
Region the read credentials belong to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#region DataVaultAwsAccessCredentials#region}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#region DataVaultAwsAccessCredentials#region}
---
@@ -1217,7 +1217,7 @@ role_arn: str
ARN to use if multiple are available in the role. Required if the role has multiple ARNs.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#role_arn DataVaultAwsAccessCredentials#role_arn}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#role_arn DataVaultAwsAccessCredentials#role_arn}
---
@@ -1231,7 +1231,7 @@ ttl: str
User specified Time-To-Live for the STS token. Uses the Role defined default_sts_ttl when not specified.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#ttl DataVaultAwsAccessCredentials#ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#ttl DataVaultAwsAccessCredentials#ttl}
---
@@ -1245,7 +1245,7 @@ type: str
Type of credentials to read. Must be either 'creds' for Access Key and Secret Key, or 'sts' for STS.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#type DataVaultAwsAccessCredentials#type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#type DataVaultAwsAccessCredentials#type}
---
diff --git a/docs/dataVaultAwsAccessCredentials.typescript.md b/docs/dataVaultAwsAccessCredentials.typescript.md
index 9a750fe9..6416223b 100644
--- a/docs/dataVaultAwsAccessCredentials.typescript.md
+++ b/docs/dataVaultAwsAccessCredentials.typescript.md
@@ -4,7 +4,7 @@
### DataVaultAwsAccessCredentials
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials vault_aws_access_credentials}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials vault_aws_access_credentials}.
#### Initializers
@@ -407,7 +407,7 @@ The construct id used in the generated config for the DataVaultAwsAccessCredenti
The id of the existing DataVaultAwsAccessCredentials that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#import import section} in the documentation of this resource for the id to use
---
@@ -856,7 +856,7 @@ const dataVaultAwsAccessCredentialsConfig: dataVaultAwsAccessCredentials.DataVau
| provisioners
| cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[]
| *No description.* |
| backend
| string
| AWS Secret Backend to read credentials from. |
| role
| string
| AWS Secret Role to read credentials from. |
-| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#id DataVaultAwsAccessCredentials#id}. |
+| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#id DataVaultAwsAccessCredentials#id}. |
| namespace
| string
| Target namespace. (requires Enterprise). |
| region
| string
| Region the read credentials belong to. |
| roleArn
| string
| ARN to use if multiple are available in the role. Required if the role has multiple ARNs. |
@@ -945,7 +945,7 @@ public readonly backend: string;
AWS Secret Backend to read credentials from.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#backend DataVaultAwsAccessCredentials#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#backend DataVaultAwsAccessCredentials#backend}
---
@@ -959,7 +959,7 @@ public readonly role: string;
AWS Secret Role to read credentials from.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#role DataVaultAwsAccessCredentials#role}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#role DataVaultAwsAccessCredentials#role}
---
@@ -971,7 +971,7 @@ public readonly id: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#id DataVaultAwsAccessCredentials#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#id DataVaultAwsAccessCredentials#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -988,7 +988,7 @@ public readonly namespace: string;
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#namespace DataVaultAwsAccessCredentials#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#namespace DataVaultAwsAccessCredentials#namespace}
---
@@ -1002,7 +1002,7 @@ public readonly region: string;
Region the read credentials belong to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#region DataVaultAwsAccessCredentials#region}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#region DataVaultAwsAccessCredentials#region}
---
@@ -1016,7 +1016,7 @@ public readonly roleArn: string;
ARN to use if multiple are available in the role. Required if the role has multiple ARNs.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#role_arn DataVaultAwsAccessCredentials#role_arn}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#role_arn DataVaultAwsAccessCredentials#role_arn}
---
@@ -1030,7 +1030,7 @@ public readonly ttl: string;
User specified Time-To-Live for the STS token. Uses the Role defined default_sts_ttl when not specified.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#ttl DataVaultAwsAccessCredentials#ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#ttl DataVaultAwsAccessCredentials#ttl}
---
@@ -1044,7 +1044,7 @@ public readonly type: string;
Type of credentials to read. Must be either 'creds' for Access Key and Secret Key, or 'sts' for STS.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#type DataVaultAwsAccessCredentials#type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#type DataVaultAwsAccessCredentials#type}
---
diff --git a/docs/dataVaultAwsStaticAccessCredentials.csharp.md b/docs/dataVaultAwsStaticAccessCredentials.csharp.md
index dd9f775e..e7db3293 100644
--- a/docs/dataVaultAwsStaticAccessCredentials.csharp.md
+++ b/docs/dataVaultAwsStaticAccessCredentials.csharp.md
@@ -4,7 +4,7 @@
### DataVaultAwsStaticAccessCredentials
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_static_access_credentials vault_aws_static_access_credentials}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_static_access_credentials vault_aws_static_access_credentials}.
#### Initializers
@@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultAwsStaticAccessCr
The id of the existing DataVaultAwsStaticAccessCredentials that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_static_access_credentials#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_static_access_credentials#import import section} in the documentation of this resource for the id to use
---
@@ -697,7 +697,7 @@ new DataVaultAwsStaticAccessCredentialsConfig {
| Provisioners
| object[]
| *No description.* |
| Backend
| string
| AWS Secret Backend to read credentials from. |
| Name
| string
| Name of the role. |
-| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_static_access_credentials#id DataVaultAwsStaticAccessCredentials#id}. |
+| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_static_access_credentials#id DataVaultAwsStaticAccessCredentials#id}. |
| Namespace
| string
| Target namespace. (requires Enterprise). |
---
@@ -782,7 +782,7 @@ public string Backend { get; set; }
AWS Secret Backend to read credentials from.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_static_access_credentials#backend DataVaultAwsStaticAccessCredentials#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_static_access_credentials#backend DataVaultAwsStaticAccessCredentials#backend}
---
@@ -796,7 +796,7 @@ public string Name { get; set; }
Name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_static_access_credentials#name DataVaultAwsStaticAccessCredentials#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_static_access_credentials#name DataVaultAwsStaticAccessCredentials#name}
---
@@ -808,7 +808,7 @@ public string Id { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_static_access_credentials#id DataVaultAwsStaticAccessCredentials#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_static_access_credentials#id DataVaultAwsStaticAccessCredentials#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -825,7 +825,7 @@ public string Namespace { get; set; }
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_static_access_credentials#namespace DataVaultAwsStaticAccessCredentials#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_static_access_credentials#namespace DataVaultAwsStaticAccessCredentials#namespace}
---
diff --git a/docs/dataVaultAwsStaticAccessCredentials.go.md b/docs/dataVaultAwsStaticAccessCredentials.go.md
index 9d7eb85b..3a71e891 100644
--- a/docs/dataVaultAwsStaticAccessCredentials.go.md
+++ b/docs/dataVaultAwsStaticAccessCredentials.go.md
@@ -4,7 +4,7 @@
### DataVaultAwsStaticAccessCredentials
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_static_access_credentials vault_aws_static_access_credentials}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_static_access_credentials vault_aws_static_access_credentials}.
#### Initializers
@@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultAwsStaticAccessCr
The id of the existing DataVaultAwsStaticAccessCredentials that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_static_access_credentials#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_static_access_credentials#import import section} in the documentation of this resource for the id to use
---
@@ -697,7 +697,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultawsstaticacc
| Provisioners
| *[]interface{}
| *No description.* |
| Backend
| *string
| AWS Secret Backend to read credentials from. |
| Name
| *string
| Name of the role. |
-| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_static_access_credentials#id DataVaultAwsStaticAccessCredentials#id}. |
+| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_static_access_credentials#id DataVaultAwsStaticAccessCredentials#id}. |
| Namespace
| *string
| Target namespace. (requires Enterprise). |
---
@@ -782,7 +782,7 @@ Backend *string
AWS Secret Backend to read credentials from.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_static_access_credentials#backend DataVaultAwsStaticAccessCredentials#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_static_access_credentials#backend DataVaultAwsStaticAccessCredentials#backend}
---
@@ -796,7 +796,7 @@ Name *string
Name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_static_access_credentials#name DataVaultAwsStaticAccessCredentials#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_static_access_credentials#name DataVaultAwsStaticAccessCredentials#name}
---
@@ -808,7 +808,7 @@ Id *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_static_access_credentials#id DataVaultAwsStaticAccessCredentials#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_static_access_credentials#id DataVaultAwsStaticAccessCredentials#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -825,7 +825,7 @@ Namespace *string
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_static_access_credentials#namespace DataVaultAwsStaticAccessCredentials#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_static_access_credentials#namespace DataVaultAwsStaticAccessCredentials#namespace}
---
diff --git a/docs/dataVaultAwsStaticAccessCredentials.java.md b/docs/dataVaultAwsStaticAccessCredentials.java.md
index ee00bbe4..59b012a1 100644
--- a/docs/dataVaultAwsStaticAccessCredentials.java.md
+++ b/docs/dataVaultAwsStaticAccessCredentials.java.md
@@ -4,7 +4,7 @@
### DataVaultAwsStaticAccessCredentials
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_static_access_credentials vault_aws_static_access_credentials}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_static_access_credentials vault_aws_static_access_credentials}.
#### Initializers
@@ -43,7 +43,7 @@ DataVaultAwsStaticAccessCredentials.Builder.create(Construct scope, java.lang.St
| provisioners
| java.util.List
| *No description.* |
| backend
| java.lang.String
| AWS Secret Backend to read credentials from. |
| name
| java.lang.String
| Name of the role. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_static_access_credentials#id DataVaultAwsStaticAccessCredentials#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_static_access_credentials#id DataVaultAwsStaticAccessCredentials#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
---
@@ -114,7 +114,7 @@ Must be unique amongst siblings in the same scope
AWS Secret Backend to read credentials from.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_static_access_credentials#backend DataVaultAwsStaticAccessCredentials#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_static_access_credentials#backend DataVaultAwsStaticAccessCredentials#backend}
---
@@ -124,7 +124,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_static_access_credentials#name DataVaultAwsStaticAccessCredentials#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_static_access_credentials#name DataVaultAwsStaticAccessCredentials#name}
---
@@ -132,7 +132,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_static_access_credentials#id DataVaultAwsStaticAccessCredentials#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_static_access_credentials#id DataVaultAwsStaticAccessCredentials#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -145,7 +145,7 @@ If you experience problems setting this value it might not be settable. Please t
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_static_access_credentials#namespace DataVaultAwsStaticAccessCredentials#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_static_access_credentials#namespace DataVaultAwsStaticAccessCredentials#namespace}
---
@@ -482,7 +482,7 @@ The construct id used in the generated config for the DataVaultAwsStaticAccessCr
The id of the existing DataVaultAwsStaticAccessCredentials that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_static_access_credentials#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_static_access_credentials#import import section} in the documentation of this resource for the id to use
---
@@ -804,7 +804,7 @@ DataVaultAwsStaticAccessCredentialsConfig.builder()
| provisioners
| java.util.List
| *No description.* |
| backend
| java.lang.String
| AWS Secret Backend to read credentials from. |
| name
| java.lang.String
| Name of the role. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_static_access_credentials#id DataVaultAwsStaticAccessCredentials#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_static_access_credentials#id DataVaultAwsStaticAccessCredentials#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
---
@@ -889,7 +889,7 @@ public java.lang.String getBackend();
AWS Secret Backend to read credentials from.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_static_access_credentials#backend DataVaultAwsStaticAccessCredentials#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_static_access_credentials#backend DataVaultAwsStaticAccessCredentials#backend}
---
@@ -903,7 +903,7 @@ public java.lang.String getName();
Name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_static_access_credentials#name DataVaultAwsStaticAccessCredentials#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_static_access_credentials#name DataVaultAwsStaticAccessCredentials#name}
---
@@ -915,7 +915,7 @@ public java.lang.String getId();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_static_access_credentials#id DataVaultAwsStaticAccessCredentials#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_static_access_credentials#id DataVaultAwsStaticAccessCredentials#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -932,7 +932,7 @@ public java.lang.String getNamespace();
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_static_access_credentials#namespace DataVaultAwsStaticAccessCredentials#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_static_access_credentials#namespace DataVaultAwsStaticAccessCredentials#namespace}
---
diff --git a/docs/dataVaultAwsStaticAccessCredentials.python.md b/docs/dataVaultAwsStaticAccessCredentials.python.md
index 593056ab..aa25a86a 100644
--- a/docs/dataVaultAwsStaticAccessCredentials.python.md
+++ b/docs/dataVaultAwsStaticAccessCredentials.python.md
@@ -4,7 +4,7 @@
### DataVaultAwsStaticAccessCredentials
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_static_access_credentials vault_aws_static_access_credentials}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_static_access_credentials vault_aws_static_access_credentials}.
#### Initializers
@@ -41,7 +41,7 @@ dataVaultAwsStaticAccessCredentials.DataVaultAwsStaticAccessCredentials(
| provisioners
| typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]]
| *No description.* |
| backend
| str
| AWS Secret Backend to read credentials from. |
| name
| str
| Name of the role. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_static_access_credentials#id DataVaultAwsStaticAccessCredentials#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_static_access_credentials#id DataVaultAwsStaticAccessCredentials#id}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
---
@@ -112,7 +112,7 @@ Must be unique amongst siblings in the same scope
AWS Secret Backend to read credentials from.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_static_access_credentials#backend DataVaultAwsStaticAccessCredentials#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_static_access_credentials#backend DataVaultAwsStaticAccessCredentials#backend}
---
@@ -122,7 +122,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_static_access_credentials#name DataVaultAwsStaticAccessCredentials#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_static_access_credentials#name DataVaultAwsStaticAccessCredentials#name}
---
@@ -130,7 +130,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_static_access_credentials#id DataVaultAwsStaticAccessCredentials#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_static_access_credentials#id DataVaultAwsStaticAccessCredentials#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -143,7 +143,7 @@ If you experience problems setting this value it might not be settable. Please t
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_static_access_credentials#namespace DataVaultAwsStaticAccessCredentials#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_static_access_credentials#namespace DataVaultAwsStaticAccessCredentials#namespace}
---
@@ -516,7 +516,7 @@ The construct id used in the generated config for the DataVaultAwsStaticAccessCr
The id of the existing DataVaultAwsStaticAccessCredentials that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_static_access_credentials#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_static_access_credentials#import import section} in the documentation of this resource for the id to use
---
@@ -834,7 +834,7 @@ dataVaultAwsStaticAccessCredentials.DataVaultAwsStaticAccessCredentialsConfig(
| provisioners
| typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]]
| *No description.* |
| backend
| str
| AWS Secret Backend to read credentials from. |
| name
| str
| Name of the role. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_static_access_credentials#id DataVaultAwsStaticAccessCredentials#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_static_access_credentials#id DataVaultAwsStaticAccessCredentials#id}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
---
@@ -919,7 +919,7 @@ backend: str
AWS Secret Backend to read credentials from.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_static_access_credentials#backend DataVaultAwsStaticAccessCredentials#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_static_access_credentials#backend DataVaultAwsStaticAccessCredentials#backend}
---
@@ -933,7 +933,7 @@ name: str
Name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_static_access_credentials#name DataVaultAwsStaticAccessCredentials#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_static_access_credentials#name DataVaultAwsStaticAccessCredentials#name}
---
@@ -945,7 +945,7 @@ id: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_static_access_credentials#id DataVaultAwsStaticAccessCredentials#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_static_access_credentials#id DataVaultAwsStaticAccessCredentials#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -962,7 +962,7 @@ namespace: str
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_static_access_credentials#namespace DataVaultAwsStaticAccessCredentials#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_static_access_credentials#namespace DataVaultAwsStaticAccessCredentials#namespace}
---
diff --git a/docs/dataVaultAwsStaticAccessCredentials.typescript.md b/docs/dataVaultAwsStaticAccessCredentials.typescript.md
index 00d15a3b..1f562fae 100644
--- a/docs/dataVaultAwsStaticAccessCredentials.typescript.md
+++ b/docs/dataVaultAwsStaticAccessCredentials.typescript.md
@@ -4,7 +4,7 @@
### DataVaultAwsStaticAccessCredentials
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_static_access_credentials vault_aws_static_access_credentials}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_static_access_credentials vault_aws_static_access_credentials}.
#### Initializers
@@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultAwsStaticAccessCr
The id of the existing DataVaultAwsStaticAccessCredentials that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_static_access_credentials#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_static_access_credentials#import import section} in the documentation of this resource for the id to use
---
@@ -685,7 +685,7 @@ const dataVaultAwsStaticAccessCredentialsConfig: dataVaultAwsStaticAccessCredent
| provisioners
| cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[]
| *No description.* |
| backend
| string
| AWS Secret Backend to read credentials from. |
| name
| string
| Name of the role. |
-| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_static_access_credentials#id DataVaultAwsStaticAccessCredentials#id}. |
+| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_static_access_credentials#id DataVaultAwsStaticAccessCredentials#id}. |
| namespace
| string
| Target namespace. (requires Enterprise). |
---
@@ -770,7 +770,7 @@ public readonly backend: string;
AWS Secret Backend to read credentials from.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_static_access_credentials#backend DataVaultAwsStaticAccessCredentials#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_static_access_credentials#backend DataVaultAwsStaticAccessCredentials#backend}
---
@@ -784,7 +784,7 @@ public readonly name: string;
Name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_static_access_credentials#name DataVaultAwsStaticAccessCredentials#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_static_access_credentials#name DataVaultAwsStaticAccessCredentials#name}
---
@@ -796,7 +796,7 @@ public readonly id: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_static_access_credentials#id DataVaultAwsStaticAccessCredentials#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_static_access_credentials#id DataVaultAwsStaticAccessCredentials#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -813,7 +813,7 @@ public readonly namespace: string;
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_static_access_credentials#namespace DataVaultAwsStaticAccessCredentials#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_static_access_credentials#namespace DataVaultAwsStaticAccessCredentials#namespace}
---
diff --git a/docs/dataVaultAzureAccessCredentials.csharp.md b/docs/dataVaultAzureAccessCredentials.csharp.md
index 246f663f..6abad379 100644
--- a/docs/dataVaultAzureAccessCredentials.csharp.md
+++ b/docs/dataVaultAzureAccessCredentials.csharp.md
@@ -4,7 +4,7 @@
### DataVaultAzureAccessCredentials
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials vault_azure_access_credentials}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials vault_azure_access_credentials}.
#### Initializers
@@ -428,7 +428,7 @@ The construct id used in the generated config for the DataVaultAzureAccessCreden
The id of the existing DataVaultAzureAccessCredentials that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#import import section} in the documentation of this resource for the id to use
---
@@ -952,7 +952,7 @@ new DataVaultAzureAccessCredentialsConfig {
| Backend
| string
| Azure Secret Backend to read credentials from. |
| Role
| string
| Azure Secret Role to read credentials from. |
| Environment
| string
| The Azure environment to use during credential validation. Defaults to the Azure Public Cloud. Some possible values: AzurePublicCloud, AzureUSGovernmentCloud. |
-| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#id DataVaultAzureAccessCredentials#id}. |
+| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#id DataVaultAzureAccessCredentials#id}. |
| MaxCredValidationSeconds
| double
| If 'validate_creds' is true, the number of seconds after which to give up validating credentials. |
| Namespace
| string
| Target namespace. (requires Enterprise). |
| NumSecondsBetweenTests
| double
| If 'validate_creds' is true, the number of seconds to wait between each test of generated credentials. |
@@ -1043,7 +1043,7 @@ public string Backend { get; set; }
Azure Secret Backend to read credentials from.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#backend DataVaultAzureAccessCredentials#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#backend DataVaultAzureAccessCredentials#backend}
---
@@ -1057,7 +1057,7 @@ public string Role { get; set; }
Azure Secret Role to read credentials from.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#role DataVaultAzureAccessCredentials#role}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#role DataVaultAzureAccessCredentials#role}
---
@@ -1071,7 +1071,7 @@ public string Environment { get; set; }
The Azure environment to use during credential validation. Defaults to the Azure Public Cloud. Some possible values: AzurePublicCloud, AzureUSGovernmentCloud.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#environment DataVaultAzureAccessCredentials#environment}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#environment DataVaultAzureAccessCredentials#environment}
---
@@ -1083,7 +1083,7 @@ public string Id { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#id DataVaultAzureAccessCredentials#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#id DataVaultAzureAccessCredentials#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1100,7 +1100,7 @@ public double MaxCredValidationSeconds { get; set; }
If 'validate_creds' is true, the number of seconds after which to give up validating credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#max_cred_validation_seconds DataVaultAzureAccessCredentials#max_cred_validation_seconds}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#max_cred_validation_seconds DataVaultAzureAccessCredentials#max_cred_validation_seconds}
---
@@ -1114,7 +1114,7 @@ public string Namespace { get; set; }
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#namespace DataVaultAzureAccessCredentials#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#namespace DataVaultAzureAccessCredentials#namespace}
---
@@ -1128,7 +1128,7 @@ public double NumSecondsBetweenTests { get; set; }
If 'validate_creds' is true, the number of seconds to wait between each test of generated credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#num_seconds_between_tests DataVaultAzureAccessCredentials#num_seconds_between_tests}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#num_seconds_between_tests DataVaultAzureAccessCredentials#num_seconds_between_tests}
---
@@ -1142,7 +1142,7 @@ public double NumSequentialSuccesses { get; set; }
If 'validate_creds' is true, the number of sequential successes required to validate generated credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#num_sequential_successes DataVaultAzureAccessCredentials#num_sequential_successes}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#num_sequential_successes DataVaultAzureAccessCredentials#num_sequential_successes}
---
@@ -1156,7 +1156,7 @@ public string SubscriptionId { get; set; }
The subscription ID to use during credential validation. Defaults to the subscription ID configured in the Vault backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#subscription_id DataVaultAzureAccessCredentials#subscription_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#subscription_id DataVaultAzureAccessCredentials#subscription_id}
---
@@ -1170,7 +1170,7 @@ public string TenantId { get; set; }
The tenant ID to use during credential validation. Defaults to the tenant ID configured in the Vault backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#tenant_id DataVaultAzureAccessCredentials#tenant_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#tenant_id DataVaultAzureAccessCredentials#tenant_id}
---
@@ -1184,7 +1184,7 @@ public object ValidateCreds { get; set; }
Whether generated credentials should be validated before being returned.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#validate_creds DataVaultAzureAccessCredentials#validate_creds}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#validate_creds DataVaultAzureAccessCredentials#validate_creds}
---
diff --git a/docs/dataVaultAzureAccessCredentials.go.md b/docs/dataVaultAzureAccessCredentials.go.md
index 13e8afd8..a6551993 100644
--- a/docs/dataVaultAzureAccessCredentials.go.md
+++ b/docs/dataVaultAzureAccessCredentials.go.md
@@ -4,7 +4,7 @@
### DataVaultAzureAccessCredentials
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials vault_azure_access_credentials}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials vault_azure_access_credentials}.
#### Initializers
@@ -428,7 +428,7 @@ The construct id used in the generated config for the DataVaultAzureAccessCreden
The id of the existing DataVaultAzureAccessCredentials that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#import import section} in the documentation of this resource for the id to use
---
@@ -952,7 +952,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultazureaccessc
| Backend
| *string
| Azure Secret Backend to read credentials from. |
| Role
| *string
| Azure Secret Role to read credentials from. |
| Environment
| *string
| The Azure environment to use during credential validation. Defaults to the Azure Public Cloud. Some possible values: AzurePublicCloud, AzureUSGovernmentCloud. |
-| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#id DataVaultAzureAccessCredentials#id}. |
+| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#id DataVaultAzureAccessCredentials#id}. |
| MaxCredValidationSeconds
| *f64
| If 'validate_creds' is true, the number of seconds after which to give up validating credentials. |
| Namespace
| *string
| Target namespace. (requires Enterprise). |
| NumSecondsBetweenTests
| *f64
| If 'validate_creds' is true, the number of seconds to wait between each test of generated credentials. |
@@ -1043,7 +1043,7 @@ Backend *string
Azure Secret Backend to read credentials from.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#backend DataVaultAzureAccessCredentials#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#backend DataVaultAzureAccessCredentials#backend}
---
@@ -1057,7 +1057,7 @@ Role *string
Azure Secret Role to read credentials from.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#role DataVaultAzureAccessCredentials#role}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#role DataVaultAzureAccessCredentials#role}
---
@@ -1071,7 +1071,7 @@ Environment *string
The Azure environment to use during credential validation. Defaults to the Azure Public Cloud. Some possible values: AzurePublicCloud, AzureUSGovernmentCloud.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#environment DataVaultAzureAccessCredentials#environment}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#environment DataVaultAzureAccessCredentials#environment}
---
@@ -1083,7 +1083,7 @@ Id *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#id DataVaultAzureAccessCredentials#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#id DataVaultAzureAccessCredentials#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1100,7 +1100,7 @@ MaxCredValidationSeconds *f64
If 'validate_creds' is true, the number of seconds after which to give up validating credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#max_cred_validation_seconds DataVaultAzureAccessCredentials#max_cred_validation_seconds}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#max_cred_validation_seconds DataVaultAzureAccessCredentials#max_cred_validation_seconds}
---
@@ -1114,7 +1114,7 @@ Namespace *string
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#namespace DataVaultAzureAccessCredentials#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#namespace DataVaultAzureAccessCredentials#namespace}
---
@@ -1128,7 +1128,7 @@ NumSecondsBetweenTests *f64
If 'validate_creds' is true, the number of seconds to wait between each test of generated credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#num_seconds_between_tests DataVaultAzureAccessCredentials#num_seconds_between_tests}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#num_seconds_between_tests DataVaultAzureAccessCredentials#num_seconds_between_tests}
---
@@ -1142,7 +1142,7 @@ NumSequentialSuccesses *f64
If 'validate_creds' is true, the number of sequential successes required to validate generated credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#num_sequential_successes DataVaultAzureAccessCredentials#num_sequential_successes}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#num_sequential_successes DataVaultAzureAccessCredentials#num_sequential_successes}
---
@@ -1156,7 +1156,7 @@ SubscriptionId *string
The subscription ID to use during credential validation. Defaults to the subscription ID configured in the Vault backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#subscription_id DataVaultAzureAccessCredentials#subscription_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#subscription_id DataVaultAzureAccessCredentials#subscription_id}
---
@@ -1170,7 +1170,7 @@ TenantId *string
The tenant ID to use during credential validation. Defaults to the tenant ID configured in the Vault backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#tenant_id DataVaultAzureAccessCredentials#tenant_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#tenant_id DataVaultAzureAccessCredentials#tenant_id}
---
@@ -1184,7 +1184,7 @@ ValidateCreds interface{}
Whether generated credentials should be validated before being returned.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#validate_creds DataVaultAzureAccessCredentials#validate_creds}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#validate_creds DataVaultAzureAccessCredentials#validate_creds}
---
diff --git a/docs/dataVaultAzureAccessCredentials.java.md b/docs/dataVaultAzureAccessCredentials.java.md
index 165c0130..7945c817 100644
--- a/docs/dataVaultAzureAccessCredentials.java.md
+++ b/docs/dataVaultAzureAccessCredentials.java.md
@@ -4,7 +4,7 @@
### DataVaultAzureAccessCredentials
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials vault_azure_access_credentials}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials vault_azure_access_credentials}.
#### Initializers
@@ -52,7 +52,7 @@ DataVaultAzureAccessCredentials.Builder.create(Construct scope, java.lang.String
| backend
| java.lang.String
| Azure Secret Backend to read credentials from. |
| role
| java.lang.String
| Azure Secret Role to read credentials from. |
| environment
| java.lang.String
| The Azure environment to use during credential validation. Defaults to the Azure Public Cloud. Some possible values: AzurePublicCloud, AzureUSGovernmentCloud. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#id DataVaultAzureAccessCredentials#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#id DataVaultAzureAccessCredentials#id}. |
| maxCredValidationSeconds
| java.lang.Number
| If 'validate_creds' is true, the number of seconds after which to give up validating credentials. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
| numSecondsBetweenTests
| java.lang.Number
| If 'validate_creds' is true, the number of seconds to wait between each test of generated credentials. |
@@ -129,7 +129,7 @@ Must be unique amongst siblings in the same scope
Azure Secret Backend to read credentials from.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#backend DataVaultAzureAccessCredentials#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#backend DataVaultAzureAccessCredentials#backend}
---
@@ -139,7 +139,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Azure Secret Role to read credentials from.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#role DataVaultAzureAccessCredentials#role}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#role DataVaultAzureAccessCredentials#role}
---
@@ -149,7 +149,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The Azure environment to use during credential validation. Defaults to the Azure Public Cloud. Some possible values: AzurePublicCloud, AzureUSGovernmentCloud.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#environment DataVaultAzureAccessCredentials#environment}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#environment DataVaultAzureAccessCredentials#environment}
---
@@ -157,7 +157,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#id DataVaultAzureAccessCredentials#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#id DataVaultAzureAccessCredentials#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -170,7 +170,7 @@ If you experience problems setting this value it might not be settable. Please t
If 'validate_creds' is true, the number of seconds after which to give up validating credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#max_cred_validation_seconds DataVaultAzureAccessCredentials#max_cred_validation_seconds}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#max_cred_validation_seconds DataVaultAzureAccessCredentials#max_cred_validation_seconds}
---
@@ -180,7 +180,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#namespace DataVaultAzureAccessCredentials#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#namespace DataVaultAzureAccessCredentials#namespace}
---
@@ -190,7 +190,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
If 'validate_creds' is true, the number of seconds to wait between each test of generated credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#num_seconds_between_tests DataVaultAzureAccessCredentials#num_seconds_between_tests}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#num_seconds_between_tests DataVaultAzureAccessCredentials#num_seconds_between_tests}
---
@@ -200,7 +200,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
If 'validate_creds' is true, the number of sequential successes required to validate generated credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#num_sequential_successes DataVaultAzureAccessCredentials#num_sequential_successes}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#num_sequential_successes DataVaultAzureAccessCredentials#num_sequential_successes}
---
@@ -210,7 +210,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The subscription ID to use during credential validation. Defaults to the subscription ID configured in the Vault backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#subscription_id DataVaultAzureAccessCredentials#subscription_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#subscription_id DataVaultAzureAccessCredentials#subscription_id}
---
@@ -220,7 +220,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The tenant ID to use during credential validation. Defaults to the tenant ID configured in the Vault backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#tenant_id DataVaultAzureAccessCredentials#tenant_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#tenant_id DataVaultAzureAccessCredentials#tenant_id}
---
@@ -230,7 +230,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Whether generated credentials should be validated before being returned.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#validate_creds DataVaultAzureAccessCredentials#validate_creds}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#validate_creds DataVaultAzureAccessCredentials#validate_creds}
---
@@ -616,7 +616,7 @@ The construct id used in the generated config for the DataVaultAzureAccessCreden
The id of the existing DataVaultAzureAccessCredentials that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#import import section} in the documentation of this resource for the id to use
---
@@ -1145,7 +1145,7 @@ DataVaultAzureAccessCredentialsConfig.builder()
| backend
| java.lang.String
| Azure Secret Backend to read credentials from. |
| role
| java.lang.String
| Azure Secret Role to read credentials from. |
| environment
| java.lang.String
| The Azure environment to use during credential validation. Defaults to the Azure Public Cloud. Some possible values: AzurePublicCloud, AzureUSGovernmentCloud. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#id DataVaultAzureAccessCredentials#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#id DataVaultAzureAccessCredentials#id}. |
| maxCredValidationSeconds
| java.lang.Number
| If 'validate_creds' is true, the number of seconds after which to give up validating credentials. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
| numSecondsBetweenTests
| java.lang.Number
| If 'validate_creds' is true, the number of seconds to wait between each test of generated credentials. |
@@ -1236,7 +1236,7 @@ public java.lang.String getBackend();
Azure Secret Backend to read credentials from.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#backend DataVaultAzureAccessCredentials#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#backend DataVaultAzureAccessCredentials#backend}
---
@@ -1250,7 +1250,7 @@ public java.lang.String getRole();
Azure Secret Role to read credentials from.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#role DataVaultAzureAccessCredentials#role}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#role DataVaultAzureAccessCredentials#role}
---
@@ -1264,7 +1264,7 @@ public java.lang.String getEnvironment();
The Azure environment to use during credential validation. Defaults to the Azure Public Cloud. Some possible values: AzurePublicCloud, AzureUSGovernmentCloud.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#environment DataVaultAzureAccessCredentials#environment}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#environment DataVaultAzureAccessCredentials#environment}
---
@@ -1276,7 +1276,7 @@ public java.lang.String getId();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#id DataVaultAzureAccessCredentials#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#id DataVaultAzureAccessCredentials#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1293,7 +1293,7 @@ public java.lang.Number getMaxCredValidationSeconds();
If 'validate_creds' is true, the number of seconds after which to give up validating credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#max_cred_validation_seconds DataVaultAzureAccessCredentials#max_cred_validation_seconds}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#max_cred_validation_seconds DataVaultAzureAccessCredentials#max_cred_validation_seconds}
---
@@ -1307,7 +1307,7 @@ public java.lang.String getNamespace();
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#namespace DataVaultAzureAccessCredentials#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#namespace DataVaultAzureAccessCredentials#namespace}
---
@@ -1321,7 +1321,7 @@ public java.lang.Number getNumSecondsBetweenTests();
If 'validate_creds' is true, the number of seconds to wait between each test of generated credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#num_seconds_between_tests DataVaultAzureAccessCredentials#num_seconds_between_tests}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#num_seconds_between_tests DataVaultAzureAccessCredentials#num_seconds_between_tests}
---
@@ -1335,7 +1335,7 @@ public java.lang.Number getNumSequentialSuccesses();
If 'validate_creds' is true, the number of sequential successes required to validate generated credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#num_sequential_successes DataVaultAzureAccessCredentials#num_sequential_successes}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#num_sequential_successes DataVaultAzureAccessCredentials#num_sequential_successes}
---
@@ -1349,7 +1349,7 @@ public java.lang.String getSubscriptionId();
The subscription ID to use during credential validation. Defaults to the subscription ID configured in the Vault backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#subscription_id DataVaultAzureAccessCredentials#subscription_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#subscription_id DataVaultAzureAccessCredentials#subscription_id}
---
@@ -1363,7 +1363,7 @@ public java.lang.String getTenantId();
The tenant ID to use during credential validation. Defaults to the tenant ID configured in the Vault backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#tenant_id DataVaultAzureAccessCredentials#tenant_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#tenant_id DataVaultAzureAccessCredentials#tenant_id}
---
@@ -1377,7 +1377,7 @@ public java.lang.Object getValidateCreds();
Whether generated credentials should be validated before being returned.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#validate_creds DataVaultAzureAccessCredentials#validate_creds}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#validate_creds DataVaultAzureAccessCredentials#validate_creds}
---
diff --git a/docs/dataVaultAzureAccessCredentials.python.md b/docs/dataVaultAzureAccessCredentials.python.md
index dd596a7b..d6014c78 100644
--- a/docs/dataVaultAzureAccessCredentials.python.md
+++ b/docs/dataVaultAzureAccessCredentials.python.md
@@ -4,7 +4,7 @@
### DataVaultAzureAccessCredentials
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials vault_azure_access_credentials}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials vault_azure_access_credentials}.
#### Initializers
@@ -49,7 +49,7 @@ dataVaultAzureAccessCredentials.DataVaultAzureAccessCredentials(
| backend
| str
| Azure Secret Backend to read credentials from. |
| role
| str
| Azure Secret Role to read credentials from. |
| environment
| str
| The Azure environment to use during credential validation. Defaults to the Azure Public Cloud. Some possible values: AzurePublicCloud, AzureUSGovernmentCloud. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#id DataVaultAzureAccessCredentials#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#id DataVaultAzureAccessCredentials#id}. |
| max_cred_validation_seconds
| typing.Union[int, float]
| If 'validate_creds' is true, the number of seconds after which to give up validating credentials. |
| namespace
| str
| Target namespace. (requires Enterprise). |
| num_seconds_between_tests
| typing.Union[int, float]
| If 'validate_creds' is true, the number of seconds to wait between each test of generated credentials. |
@@ -126,7 +126,7 @@ Must be unique amongst siblings in the same scope
Azure Secret Backend to read credentials from.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#backend DataVaultAzureAccessCredentials#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#backend DataVaultAzureAccessCredentials#backend}
---
@@ -136,7 +136,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Azure Secret Role to read credentials from.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#role DataVaultAzureAccessCredentials#role}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#role DataVaultAzureAccessCredentials#role}
---
@@ -146,7 +146,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The Azure environment to use during credential validation. Defaults to the Azure Public Cloud. Some possible values: AzurePublicCloud, AzureUSGovernmentCloud.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#environment DataVaultAzureAccessCredentials#environment}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#environment DataVaultAzureAccessCredentials#environment}
---
@@ -154,7 +154,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#id DataVaultAzureAccessCredentials#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#id DataVaultAzureAccessCredentials#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -167,7 +167,7 @@ If you experience problems setting this value it might not be settable. Please t
If 'validate_creds' is true, the number of seconds after which to give up validating credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#max_cred_validation_seconds DataVaultAzureAccessCredentials#max_cred_validation_seconds}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#max_cred_validation_seconds DataVaultAzureAccessCredentials#max_cred_validation_seconds}
---
@@ -177,7 +177,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#namespace DataVaultAzureAccessCredentials#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#namespace DataVaultAzureAccessCredentials#namespace}
---
@@ -187,7 +187,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
If 'validate_creds' is true, the number of seconds to wait between each test of generated credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#num_seconds_between_tests DataVaultAzureAccessCredentials#num_seconds_between_tests}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#num_seconds_between_tests DataVaultAzureAccessCredentials#num_seconds_between_tests}
---
@@ -197,7 +197,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
If 'validate_creds' is true, the number of sequential successes required to validate generated credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#num_sequential_successes DataVaultAzureAccessCredentials#num_sequential_successes}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#num_sequential_successes DataVaultAzureAccessCredentials#num_sequential_successes}
---
@@ -207,7 +207,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The subscription ID to use during credential validation. Defaults to the subscription ID configured in the Vault backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#subscription_id DataVaultAzureAccessCredentials#subscription_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#subscription_id DataVaultAzureAccessCredentials#subscription_id}
---
@@ -217,7 +217,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The tenant ID to use during credential validation. Defaults to the tenant ID configured in the Vault backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#tenant_id DataVaultAzureAccessCredentials#tenant_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#tenant_id DataVaultAzureAccessCredentials#tenant_id}
---
@@ -227,7 +227,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Whether generated credentials should be validated before being returned.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#validate_creds DataVaultAzureAccessCredentials#validate_creds}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#validate_creds DataVaultAzureAccessCredentials#validate_creds}
---
@@ -649,7 +649,7 @@ The construct id used in the generated config for the DataVaultAzureAccessCreden
The id of the existing DataVaultAzureAccessCredentials that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#import import section} in the documentation of this resource for the id to use
---
@@ -1173,7 +1173,7 @@ dataVaultAzureAccessCredentials.DataVaultAzureAccessCredentialsConfig(
| backend
| str
| Azure Secret Backend to read credentials from. |
| role
| str
| Azure Secret Role to read credentials from. |
| environment
| str
| The Azure environment to use during credential validation. Defaults to the Azure Public Cloud. Some possible values: AzurePublicCloud, AzureUSGovernmentCloud. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#id DataVaultAzureAccessCredentials#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#id DataVaultAzureAccessCredentials#id}. |
| max_cred_validation_seconds
| typing.Union[int, float]
| If 'validate_creds' is true, the number of seconds after which to give up validating credentials. |
| namespace
| str
| Target namespace. (requires Enterprise). |
| num_seconds_between_tests
| typing.Union[int, float]
| If 'validate_creds' is true, the number of seconds to wait between each test of generated credentials. |
@@ -1264,7 +1264,7 @@ backend: str
Azure Secret Backend to read credentials from.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#backend DataVaultAzureAccessCredentials#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#backend DataVaultAzureAccessCredentials#backend}
---
@@ -1278,7 +1278,7 @@ role: str
Azure Secret Role to read credentials from.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#role DataVaultAzureAccessCredentials#role}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#role DataVaultAzureAccessCredentials#role}
---
@@ -1292,7 +1292,7 @@ environment: str
The Azure environment to use during credential validation. Defaults to the Azure Public Cloud. Some possible values: AzurePublicCloud, AzureUSGovernmentCloud.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#environment DataVaultAzureAccessCredentials#environment}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#environment DataVaultAzureAccessCredentials#environment}
---
@@ -1304,7 +1304,7 @@ id: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#id DataVaultAzureAccessCredentials#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#id DataVaultAzureAccessCredentials#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1321,7 +1321,7 @@ max_cred_validation_seconds: typing.Union[int, float]
If 'validate_creds' is true, the number of seconds after which to give up validating credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#max_cred_validation_seconds DataVaultAzureAccessCredentials#max_cred_validation_seconds}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#max_cred_validation_seconds DataVaultAzureAccessCredentials#max_cred_validation_seconds}
---
@@ -1335,7 +1335,7 @@ namespace: str
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#namespace DataVaultAzureAccessCredentials#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#namespace DataVaultAzureAccessCredentials#namespace}
---
@@ -1349,7 +1349,7 @@ num_seconds_between_tests: typing.Union[int, float]
If 'validate_creds' is true, the number of seconds to wait between each test of generated credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#num_seconds_between_tests DataVaultAzureAccessCredentials#num_seconds_between_tests}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#num_seconds_between_tests DataVaultAzureAccessCredentials#num_seconds_between_tests}
---
@@ -1363,7 +1363,7 @@ num_sequential_successes: typing.Union[int, float]
If 'validate_creds' is true, the number of sequential successes required to validate generated credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#num_sequential_successes DataVaultAzureAccessCredentials#num_sequential_successes}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#num_sequential_successes DataVaultAzureAccessCredentials#num_sequential_successes}
---
@@ -1377,7 +1377,7 @@ subscription_id: str
The subscription ID to use during credential validation. Defaults to the subscription ID configured in the Vault backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#subscription_id DataVaultAzureAccessCredentials#subscription_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#subscription_id DataVaultAzureAccessCredentials#subscription_id}
---
@@ -1391,7 +1391,7 @@ tenant_id: str
The tenant ID to use during credential validation. Defaults to the tenant ID configured in the Vault backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#tenant_id DataVaultAzureAccessCredentials#tenant_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#tenant_id DataVaultAzureAccessCredentials#tenant_id}
---
@@ -1405,7 +1405,7 @@ validate_creds: typing.Union[bool, IResolvable]
Whether generated credentials should be validated before being returned.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#validate_creds DataVaultAzureAccessCredentials#validate_creds}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#validate_creds DataVaultAzureAccessCredentials#validate_creds}
---
diff --git a/docs/dataVaultAzureAccessCredentials.typescript.md b/docs/dataVaultAzureAccessCredentials.typescript.md
index 078c8335..8ae6d2ab 100644
--- a/docs/dataVaultAzureAccessCredentials.typescript.md
+++ b/docs/dataVaultAzureAccessCredentials.typescript.md
@@ -4,7 +4,7 @@
### DataVaultAzureAccessCredentials
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials vault_azure_access_credentials}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials vault_azure_access_credentials}.
#### Initializers
@@ -428,7 +428,7 @@ The construct id used in the generated config for the DataVaultAzureAccessCreden
The id of the existing DataVaultAzureAccessCredentials that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#import import section} in the documentation of this resource for the id to use
---
@@ -933,7 +933,7 @@ const dataVaultAzureAccessCredentialsConfig: dataVaultAzureAccessCredentials.Dat
| backend
| string
| Azure Secret Backend to read credentials from. |
| role
| string
| Azure Secret Role to read credentials from. |
| environment
| string
| The Azure environment to use during credential validation. Defaults to the Azure Public Cloud. Some possible values: AzurePublicCloud, AzureUSGovernmentCloud. |
-| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#id DataVaultAzureAccessCredentials#id}. |
+| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#id DataVaultAzureAccessCredentials#id}. |
| maxCredValidationSeconds
| number
| If 'validate_creds' is true, the number of seconds after which to give up validating credentials. |
| namespace
| string
| Target namespace. (requires Enterprise). |
| numSecondsBetweenTests
| number
| If 'validate_creds' is true, the number of seconds to wait between each test of generated credentials. |
@@ -1024,7 +1024,7 @@ public readonly backend: string;
Azure Secret Backend to read credentials from.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#backend DataVaultAzureAccessCredentials#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#backend DataVaultAzureAccessCredentials#backend}
---
@@ -1038,7 +1038,7 @@ public readonly role: string;
Azure Secret Role to read credentials from.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#role DataVaultAzureAccessCredentials#role}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#role DataVaultAzureAccessCredentials#role}
---
@@ -1052,7 +1052,7 @@ public readonly environment: string;
The Azure environment to use during credential validation. Defaults to the Azure Public Cloud. Some possible values: AzurePublicCloud, AzureUSGovernmentCloud.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#environment DataVaultAzureAccessCredentials#environment}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#environment DataVaultAzureAccessCredentials#environment}
---
@@ -1064,7 +1064,7 @@ public readonly id: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#id DataVaultAzureAccessCredentials#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#id DataVaultAzureAccessCredentials#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1081,7 +1081,7 @@ public readonly maxCredValidationSeconds: number;
If 'validate_creds' is true, the number of seconds after which to give up validating credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#max_cred_validation_seconds DataVaultAzureAccessCredentials#max_cred_validation_seconds}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#max_cred_validation_seconds DataVaultAzureAccessCredentials#max_cred_validation_seconds}
---
@@ -1095,7 +1095,7 @@ public readonly namespace: string;
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#namespace DataVaultAzureAccessCredentials#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#namespace DataVaultAzureAccessCredentials#namespace}
---
@@ -1109,7 +1109,7 @@ public readonly numSecondsBetweenTests: number;
If 'validate_creds' is true, the number of seconds to wait between each test of generated credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#num_seconds_between_tests DataVaultAzureAccessCredentials#num_seconds_between_tests}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#num_seconds_between_tests DataVaultAzureAccessCredentials#num_seconds_between_tests}
---
@@ -1123,7 +1123,7 @@ public readonly numSequentialSuccesses: number;
If 'validate_creds' is true, the number of sequential successes required to validate generated credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#num_sequential_successes DataVaultAzureAccessCredentials#num_sequential_successes}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#num_sequential_successes DataVaultAzureAccessCredentials#num_sequential_successes}
---
@@ -1137,7 +1137,7 @@ public readonly subscriptionId: string;
The subscription ID to use during credential validation. Defaults to the subscription ID configured in the Vault backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#subscription_id DataVaultAzureAccessCredentials#subscription_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#subscription_id DataVaultAzureAccessCredentials#subscription_id}
---
@@ -1151,7 +1151,7 @@ public readonly tenantId: string;
The tenant ID to use during credential validation. Defaults to the tenant ID configured in the Vault backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#tenant_id DataVaultAzureAccessCredentials#tenant_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#tenant_id DataVaultAzureAccessCredentials#tenant_id}
---
@@ -1165,7 +1165,7 @@ public readonly validateCreds: boolean | IResolvable;
Whether generated credentials should be validated before being returned.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#validate_creds DataVaultAzureAccessCredentials#validate_creds}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#validate_creds DataVaultAzureAccessCredentials#validate_creds}
---
diff --git a/docs/dataVaultGcpAuthBackendRole.csharp.md b/docs/dataVaultGcpAuthBackendRole.csharp.md
index 2a6283eb..39717b91 100644
--- a/docs/dataVaultGcpAuthBackendRole.csharp.md
+++ b/docs/dataVaultGcpAuthBackendRole.csharp.md
@@ -4,7 +4,7 @@
### DataVaultGcpAuthBackendRole
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role vault_gcp_auth_backend_role}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role vault_gcp_auth_backend_role}.
#### Initializers
@@ -449,7 +449,7 @@ The construct id used in the generated config for the DataVaultGcpAuthBackendRol
The id of the existing DataVaultGcpAuthBackendRole that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#import import section} in the documentation of this resource for the id to use
---
@@ -1040,7 +1040,7 @@ new DataVaultGcpAuthBackendRoleConfig {
| Provisioners
| object[]
| *No description.* |
| RoleName
| string
| Name of the role. |
| Backend
| string
| Unique name of the auth backend to configure. |
-| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#id DataVaultGcpAuthBackendRole#id}. |
+| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#id DataVaultGcpAuthBackendRole#id}. |
| Namespace
| string
| Target namespace. (requires Enterprise). |
| TokenBoundCidrs
| string[]
| Specifies the blocks of IP addresses which are allowed to use the generated token. |
| TokenExplicitMaxTtl
| double
| Generated Token's Explicit Maximum TTL in seconds. |
@@ -1134,7 +1134,7 @@ public string RoleName { get; set; }
Name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#role_name DataVaultGcpAuthBackendRole#role_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#role_name DataVaultGcpAuthBackendRole#role_name}
---
@@ -1148,7 +1148,7 @@ public string Backend { get; set; }
Unique name of the auth backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#backend DataVaultGcpAuthBackendRole#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#backend DataVaultGcpAuthBackendRole#backend}
---
@@ -1160,7 +1160,7 @@ public string Id { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#id DataVaultGcpAuthBackendRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#id DataVaultGcpAuthBackendRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1177,7 +1177,7 @@ public string Namespace { get; set; }
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#namespace DataVaultGcpAuthBackendRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#namespace DataVaultGcpAuthBackendRole#namespace}
---
@@ -1191,7 +1191,7 @@ public string[] TokenBoundCidrs { get; set; }
Specifies the blocks of IP addresses which are allowed to use the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_bound_cidrs DataVaultGcpAuthBackendRole#token_bound_cidrs}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_bound_cidrs DataVaultGcpAuthBackendRole#token_bound_cidrs}
---
@@ -1205,7 +1205,7 @@ public double TokenExplicitMaxTtl { get; set; }
Generated Token's Explicit Maximum TTL in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_explicit_max_ttl DataVaultGcpAuthBackendRole#token_explicit_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_explicit_max_ttl DataVaultGcpAuthBackendRole#token_explicit_max_ttl}
---
@@ -1219,7 +1219,7 @@ public double TokenMaxTtl { get; set; }
The maximum lifetime of the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_max_ttl DataVaultGcpAuthBackendRole#token_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_max_ttl DataVaultGcpAuthBackendRole#token_max_ttl}
---
@@ -1233,7 +1233,7 @@ public object TokenNoDefaultPolicy { get; set; }
If true, the 'default' policy will not automatically be added to generated tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_no_default_policy DataVaultGcpAuthBackendRole#token_no_default_policy}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_no_default_policy DataVaultGcpAuthBackendRole#token_no_default_policy}
---
@@ -1247,7 +1247,7 @@ public double TokenNumUses { get; set; }
The maximum number of times a token may be used, a value of zero means unlimited.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_num_uses DataVaultGcpAuthBackendRole#token_num_uses}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_num_uses DataVaultGcpAuthBackendRole#token_num_uses}
---
@@ -1261,7 +1261,7 @@ public double TokenPeriod { get; set; }
Generated Token's Period.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_period DataVaultGcpAuthBackendRole#token_period}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_period DataVaultGcpAuthBackendRole#token_period}
---
@@ -1275,7 +1275,7 @@ public string[] TokenPolicies { get; set; }
Generated Token's Policies.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_policies DataVaultGcpAuthBackendRole#token_policies}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_policies DataVaultGcpAuthBackendRole#token_policies}
---
@@ -1289,7 +1289,7 @@ public double TokenTtl { get; set; }
The initial ttl of the token to generate in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_ttl DataVaultGcpAuthBackendRole#token_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_ttl DataVaultGcpAuthBackendRole#token_ttl}
---
@@ -1303,7 +1303,7 @@ public string TokenType { get; set; }
The type of token to generate, service or batch.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_type DataVaultGcpAuthBackendRole#token_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_type DataVaultGcpAuthBackendRole#token_type}
---
diff --git a/docs/dataVaultGcpAuthBackendRole.go.md b/docs/dataVaultGcpAuthBackendRole.go.md
index b4dd3711..01f319a5 100644
--- a/docs/dataVaultGcpAuthBackendRole.go.md
+++ b/docs/dataVaultGcpAuthBackendRole.go.md
@@ -4,7 +4,7 @@
### DataVaultGcpAuthBackendRole
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role vault_gcp_auth_backend_role}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role vault_gcp_auth_backend_role}.
#### Initializers
@@ -449,7 +449,7 @@ The construct id used in the generated config for the DataVaultGcpAuthBackendRol
The id of the existing DataVaultGcpAuthBackendRole that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#import import section} in the documentation of this resource for the id to use
---
@@ -1040,7 +1040,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultgcpauthbacke
| Provisioners
| *[]interface{}
| *No description.* |
| RoleName
| *string
| Name of the role. |
| Backend
| *string
| Unique name of the auth backend to configure. |
-| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#id DataVaultGcpAuthBackendRole#id}. |
+| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#id DataVaultGcpAuthBackendRole#id}. |
| Namespace
| *string
| Target namespace. (requires Enterprise). |
| TokenBoundCidrs
| *[]*string
| Specifies the blocks of IP addresses which are allowed to use the generated token. |
| TokenExplicitMaxTtl
| *f64
| Generated Token's Explicit Maximum TTL in seconds. |
@@ -1134,7 +1134,7 @@ RoleName *string
Name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#role_name DataVaultGcpAuthBackendRole#role_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#role_name DataVaultGcpAuthBackendRole#role_name}
---
@@ -1148,7 +1148,7 @@ Backend *string
Unique name of the auth backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#backend DataVaultGcpAuthBackendRole#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#backend DataVaultGcpAuthBackendRole#backend}
---
@@ -1160,7 +1160,7 @@ Id *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#id DataVaultGcpAuthBackendRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#id DataVaultGcpAuthBackendRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1177,7 +1177,7 @@ Namespace *string
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#namespace DataVaultGcpAuthBackendRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#namespace DataVaultGcpAuthBackendRole#namespace}
---
@@ -1191,7 +1191,7 @@ TokenBoundCidrs *[]*string
Specifies the blocks of IP addresses which are allowed to use the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_bound_cidrs DataVaultGcpAuthBackendRole#token_bound_cidrs}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_bound_cidrs DataVaultGcpAuthBackendRole#token_bound_cidrs}
---
@@ -1205,7 +1205,7 @@ TokenExplicitMaxTtl *f64
Generated Token's Explicit Maximum TTL in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_explicit_max_ttl DataVaultGcpAuthBackendRole#token_explicit_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_explicit_max_ttl DataVaultGcpAuthBackendRole#token_explicit_max_ttl}
---
@@ -1219,7 +1219,7 @@ TokenMaxTtl *f64
The maximum lifetime of the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_max_ttl DataVaultGcpAuthBackendRole#token_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_max_ttl DataVaultGcpAuthBackendRole#token_max_ttl}
---
@@ -1233,7 +1233,7 @@ TokenNoDefaultPolicy interface{}
If true, the 'default' policy will not automatically be added to generated tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_no_default_policy DataVaultGcpAuthBackendRole#token_no_default_policy}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_no_default_policy DataVaultGcpAuthBackendRole#token_no_default_policy}
---
@@ -1247,7 +1247,7 @@ TokenNumUses *f64
The maximum number of times a token may be used, a value of zero means unlimited.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_num_uses DataVaultGcpAuthBackendRole#token_num_uses}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_num_uses DataVaultGcpAuthBackendRole#token_num_uses}
---
@@ -1261,7 +1261,7 @@ TokenPeriod *f64
Generated Token's Period.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_period DataVaultGcpAuthBackendRole#token_period}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_period DataVaultGcpAuthBackendRole#token_period}
---
@@ -1275,7 +1275,7 @@ TokenPolicies *[]*string
Generated Token's Policies.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_policies DataVaultGcpAuthBackendRole#token_policies}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_policies DataVaultGcpAuthBackendRole#token_policies}
---
@@ -1289,7 +1289,7 @@ TokenTtl *f64
The initial ttl of the token to generate in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_ttl DataVaultGcpAuthBackendRole#token_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_ttl DataVaultGcpAuthBackendRole#token_ttl}
---
@@ -1303,7 +1303,7 @@ TokenType *string
The type of token to generate, service or batch.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_type DataVaultGcpAuthBackendRole#token_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_type DataVaultGcpAuthBackendRole#token_type}
---
diff --git a/docs/dataVaultGcpAuthBackendRole.java.md b/docs/dataVaultGcpAuthBackendRole.java.md
index 747f1709..1efb2ff5 100644
--- a/docs/dataVaultGcpAuthBackendRole.java.md
+++ b/docs/dataVaultGcpAuthBackendRole.java.md
@@ -4,7 +4,7 @@
### DataVaultGcpAuthBackendRole
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role vault_gcp_auth_backend_role}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role vault_gcp_auth_backend_role}.
#### Initializers
@@ -53,7 +53,7 @@ DataVaultGcpAuthBackendRole.Builder.create(Construct scope, java.lang.String id)
| provisioners
| java.util.List
| *No description.* |
| roleName
| java.lang.String
| Name of the role. |
| backend
| java.lang.String
| Unique name of the auth backend to configure. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#id DataVaultGcpAuthBackendRole#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#id DataVaultGcpAuthBackendRole#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
| tokenBoundCidrs
| java.util.List
| Specifies the blocks of IP addresses which are allowed to use the generated token. |
| tokenExplicitMaxTtl
| java.lang.Number
| Generated Token's Explicit Maximum TTL in seconds. |
@@ -133,7 +133,7 @@ Must be unique amongst siblings in the same scope
Name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#role_name DataVaultGcpAuthBackendRole#role_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#role_name DataVaultGcpAuthBackendRole#role_name}
---
@@ -143,7 +143,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Unique name of the auth backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#backend DataVaultGcpAuthBackendRole#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#backend DataVaultGcpAuthBackendRole#backend}
---
@@ -151,7 +151,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#id DataVaultGcpAuthBackendRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#id DataVaultGcpAuthBackendRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -164,7 +164,7 @@ If you experience problems setting this value it might not be settable. Please t
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#namespace DataVaultGcpAuthBackendRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#namespace DataVaultGcpAuthBackendRole#namespace}
---
@@ -174,7 +174,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Specifies the blocks of IP addresses which are allowed to use the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_bound_cidrs DataVaultGcpAuthBackendRole#token_bound_cidrs}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_bound_cidrs DataVaultGcpAuthBackendRole#token_bound_cidrs}
---
@@ -184,7 +184,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Generated Token's Explicit Maximum TTL in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_explicit_max_ttl DataVaultGcpAuthBackendRole#token_explicit_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_explicit_max_ttl DataVaultGcpAuthBackendRole#token_explicit_max_ttl}
---
@@ -194,7 +194,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The maximum lifetime of the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_max_ttl DataVaultGcpAuthBackendRole#token_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_max_ttl DataVaultGcpAuthBackendRole#token_max_ttl}
---
@@ -204,7 +204,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
If true, the 'default' policy will not automatically be added to generated tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_no_default_policy DataVaultGcpAuthBackendRole#token_no_default_policy}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_no_default_policy DataVaultGcpAuthBackendRole#token_no_default_policy}
---
@@ -214,7 +214,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The maximum number of times a token may be used, a value of zero means unlimited.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_num_uses DataVaultGcpAuthBackendRole#token_num_uses}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_num_uses DataVaultGcpAuthBackendRole#token_num_uses}
---
@@ -224,7 +224,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Generated Token's Period.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_period DataVaultGcpAuthBackendRole#token_period}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_period DataVaultGcpAuthBackendRole#token_period}
---
@@ -234,7 +234,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Generated Token's Policies.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_policies DataVaultGcpAuthBackendRole#token_policies}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_policies DataVaultGcpAuthBackendRole#token_policies}
---
@@ -244,7 +244,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The initial ttl of the token to generate in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_ttl DataVaultGcpAuthBackendRole#token_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_ttl DataVaultGcpAuthBackendRole#token_ttl}
---
@@ -254,7 +254,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The type of token to generate, service or batch.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_type DataVaultGcpAuthBackendRole#token_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_type DataVaultGcpAuthBackendRole#token_type}
---
@@ -661,7 +661,7 @@ The construct id used in the generated config for the DataVaultGcpAuthBackendRol
The id of the existing DataVaultGcpAuthBackendRole that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#import import section} in the documentation of this resource for the id to use
---
@@ -1257,7 +1257,7 @@ DataVaultGcpAuthBackendRoleConfig.builder()
| provisioners
| java.util.List
| *No description.* |
| roleName
| java.lang.String
| Name of the role. |
| backend
| java.lang.String
| Unique name of the auth backend to configure. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#id DataVaultGcpAuthBackendRole#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#id DataVaultGcpAuthBackendRole#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
| tokenBoundCidrs
| java.util.List
| Specifies the blocks of IP addresses which are allowed to use the generated token. |
| tokenExplicitMaxTtl
| java.lang.Number
| Generated Token's Explicit Maximum TTL in seconds. |
@@ -1351,7 +1351,7 @@ public java.lang.String getRoleName();
Name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#role_name DataVaultGcpAuthBackendRole#role_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#role_name DataVaultGcpAuthBackendRole#role_name}
---
@@ -1365,7 +1365,7 @@ public java.lang.String getBackend();
Unique name of the auth backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#backend DataVaultGcpAuthBackendRole#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#backend DataVaultGcpAuthBackendRole#backend}
---
@@ -1377,7 +1377,7 @@ public java.lang.String getId();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#id DataVaultGcpAuthBackendRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#id DataVaultGcpAuthBackendRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1394,7 +1394,7 @@ public java.lang.String getNamespace();
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#namespace DataVaultGcpAuthBackendRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#namespace DataVaultGcpAuthBackendRole#namespace}
---
@@ -1408,7 +1408,7 @@ public java.util.List getTokenBoundCidrs();
Specifies the blocks of IP addresses which are allowed to use the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_bound_cidrs DataVaultGcpAuthBackendRole#token_bound_cidrs}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_bound_cidrs DataVaultGcpAuthBackendRole#token_bound_cidrs}
---
@@ -1422,7 +1422,7 @@ public java.lang.Number getTokenExplicitMaxTtl();
Generated Token's Explicit Maximum TTL in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_explicit_max_ttl DataVaultGcpAuthBackendRole#token_explicit_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_explicit_max_ttl DataVaultGcpAuthBackendRole#token_explicit_max_ttl}
---
@@ -1436,7 +1436,7 @@ public java.lang.Number getTokenMaxTtl();
The maximum lifetime of the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_max_ttl DataVaultGcpAuthBackendRole#token_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_max_ttl DataVaultGcpAuthBackendRole#token_max_ttl}
---
@@ -1450,7 +1450,7 @@ public java.lang.Object getTokenNoDefaultPolicy();
If true, the 'default' policy will not automatically be added to generated tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_no_default_policy DataVaultGcpAuthBackendRole#token_no_default_policy}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_no_default_policy DataVaultGcpAuthBackendRole#token_no_default_policy}
---
@@ -1464,7 +1464,7 @@ public java.lang.Number getTokenNumUses();
The maximum number of times a token may be used, a value of zero means unlimited.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_num_uses DataVaultGcpAuthBackendRole#token_num_uses}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_num_uses DataVaultGcpAuthBackendRole#token_num_uses}
---
@@ -1478,7 +1478,7 @@ public java.lang.Number getTokenPeriod();
Generated Token's Period.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_period DataVaultGcpAuthBackendRole#token_period}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_period DataVaultGcpAuthBackendRole#token_period}
---
@@ -1492,7 +1492,7 @@ public java.util.List getTokenPolicies();
Generated Token's Policies.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_policies DataVaultGcpAuthBackendRole#token_policies}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_policies DataVaultGcpAuthBackendRole#token_policies}
---
@@ -1506,7 +1506,7 @@ public java.lang.Number getTokenTtl();
The initial ttl of the token to generate in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_ttl DataVaultGcpAuthBackendRole#token_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_ttl DataVaultGcpAuthBackendRole#token_ttl}
---
@@ -1520,7 +1520,7 @@ public java.lang.String getTokenType();
The type of token to generate, service or batch.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_type DataVaultGcpAuthBackendRole#token_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_type DataVaultGcpAuthBackendRole#token_type}
---
diff --git a/docs/dataVaultGcpAuthBackendRole.python.md b/docs/dataVaultGcpAuthBackendRole.python.md
index d2510bac..363f2819 100644
--- a/docs/dataVaultGcpAuthBackendRole.python.md
+++ b/docs/dataVaultGcpAuthBackendRole.python.md
@@ -4,7 +4,7 @@
### DataVaultGcpAuthBackendRole
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role vault_gcp_auth_backend_role}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role vault_gcp_auth_backend_role}.
#### Initializers
@@ -50,7 +50,7 @@ dataVaultGcpAuthBackendRole.DataVaultGcpAuthBackendRole(
| provisioners
| typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]]
| *No description.* |
| role_name
| str
| Name of the role. |
| backend
| str
| Unique name of the auth backend to configure. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#id DataVaultGcpAuthBackendRole#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#id DataVaultGcpAuthBackendRole#id}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
| token_bound_cidrs
| typing.List[str]
| Specifies the blocks of IP addresses which are allowed to use the generated token. |
| token_explicit_max_ttl
| typing.Union[int, float]
| Generated Token's Explicit Maximum TTL in seconds. |
@@ -130,7 +130,7 @@ Must be unique amongst siblings in the same scope
Name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#role_name DataVaultGcpAuthBackendRole#role_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#role_name DataVaultGcpAuthBackendRole#role_name}
---
@@ -140,7 +140,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Unique name of the auth backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#backend DataVaultGcpAuthBackendRole#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#backend DataVaultGcpAuthBackendRole#backend}
---
@@ -148,7 +148,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#id DataVaultGcpAuthBackendRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#id DataVaultGcpAuthBackendRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -161,7 +161,7 @@ If you experience problems setting this value it might not be settable. Please t
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#namespace DataVaultGcpAuthBackendRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#namespace DataVaultGcpAuthBackendRole#namespace}
---
@@ -171,7 +171,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Specifies the blocks of IP addresses which are allowed to use the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_bound_cidrs DataVaultGcpAuthBackendRole#token_bound_cidrs}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_bound_cidrs DataVaultGcpAuthBackendRole#token_bound_cidrs}
---
@@ -181,7 +181,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Generated Token's Explicit Maximum TTL in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_explicit_max_ttl DataVaultGcpAuthBackendRole#token_explicit_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_explicit_max_ttl DataVaultGcpAuthBackendRole#token_explicit_max_ttl}
---
@@ -191,7 +191,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The maximum lifetime of the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_max_ttl DataVaultGcpAuthBackendRole#token_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_max_ttl DataVaultGcpAuthBackendRole#token_max_ttl}
---
@@ -201,7 +201,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
If true, the 'default' policy will not automatically be added to generated tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_no_default_policy DataVaultGcpAuthBackendRole#token_no_default_policy}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_no_default_policy DataVaultGcpAuthBackendRole#token_no_default_policy}
---
@@ -211,7 +211,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The maximum number of times a token may be used, a value of zero means unlimited.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_num_uses DataVaultGcpAuthBackendRole#token_num_uses}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_num_uses DataVaultGcpAuthBackendRole#token_num_uses}
---
@@ -221,7 +221,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Generated Token's Period.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_period DataVaultGcpAuthBackendRole#token_period}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_period DataVaultGcpAuthBackendRole#token_period}
---
@@ -231,7 +231,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Generated Token's Policies.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_policies DataVaultGcpAuthBackendRole#token_policies}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_policies DataVaultGcpAuthBackendRole#token_policies}
---
@@ -241,7 +241,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The initial ttl of the token to generate in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_ttl DataVaultGcpAuthBackendRole#token_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_ttl DataVaultGcpAuthBackendRole#token_ttl}
---
@@ -251,7 +251,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The type of token to generate, service or batch.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_type DataVaultGcpAuthBackendRole#token_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_type DataVaultGcpAuthBackendRole#token_type}
---
@@ -694,7 +694,7 @@ The construct id used in the generated config for the DataVaultGcpAuthBackendRol
The id of the existing DataVaultGcpAuthBackendRole that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#import import section} in the documentation of this resource for the id to use
---
@@ -1285,7 +1285,7 @@ dataVaultGcpAuthBackendRole.DataVaultGcpAuthBackendRoleConfig(
| provisioners
| typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]]
| *No description.* |
| role_name
| str
| Name of the role. |
| backend
| str
| Unique name of the auth backend to configure. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#id DataVaultGcpAuthBackendRole#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#id DataVaultGcpAuthBackendRole#id}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
| token_bound_cidrs
| typing.List[str]
| Specifies the blocks of IP addresses which are allowed to use the generated token. |
| token_explicit_max_ttl
| typing.Union[int, float]
| Generated Token's Explicit Maximum TTL in seconds. |
@@ -1379,7 +1379,7 @@ role_name: str
Name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#role_name DataVaultGcpAuthBackendRole#role_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#role_name DataVaultGcpAuthBackendRole#role_name}
---
@@ -1393,7 +1393,7 @@ backend: str
Unique name of the auth backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#backend DataVaultGcpAuthBackendRole#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#backend DataVaultGcpAuthBackendRole#backend}
---
@@ -1405,7 +1405,7 @@ id: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#id DataVaultGcpAuthBackendRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#id DataVaultGcpAuthBackendRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1422,7 +1422,7 @@ namespace: str
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#namespace DataVaultGcpAuthBackendRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#namespace DataVaultGcpAuthBackendRole#namespace}
---
@@ -1436,7 +1436,7 @@ token_bound_cidrs: typing.List[str]
Specifies the blocks of IP addresses which are allowed to use the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_bound_cidrs DataVaultGcpAuthBackendRole#token_bound_cidrs}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_bound_cidrs DataVaultGcpAuthBackendRole#token_bound_cidrs}
---
@@ -1450,7 +1450,7 @@ token_explicit_max_ttl: typing.Union[int, float]
Generated Token's Explicit Maximum TTL in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_explicit_max_ttl DataVaultGcpAuthBackendRole#token_explicit_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_explicit_max_ttl DataVaultGcpAuthBackendRole#token_explicit_max_ttl}
---
@@ -1464,7 +1464,7 @@ token_max_ttl: typing.Union[int, float]
The maximum lifetime of the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_max_ttl DataVaultGcpAuthBackendRole#token_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_max_ttl DataVaultGcpAuthBackendRole#token_max_ttl}
---
@@ -1478,7 +1478,7 @@ token_no_default_policy: typing.Union[bool, IResolvable]
If true, the 'default' policy will not automatically be added to generated tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_no_default_policy DataVaultGcpAuthBackendRole#token_no_default_policy}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_no_default_policy DataVaultGcpAuthBackendRole#token_no_default_policy}
---
@@ -1492,7 +1492,7 @@ token_num_uses: typing.Union[int, float]
The maximum number of times a token may be used, a value of zero means unlimited.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_num_uses DataVaultGcpAuthBackendRole#token_num_uses}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_num_uses DataVaultGcpAuthBackendRole#token_num_uses}
---
@@ -1506,7 +1506,7 @@ token_period: typing.Union[int, float]
Generated Token's Period.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_period DataVaultGcpAuthBackendRole#token_period}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_period DataVaultGcpAuthBackendRole#token_period}
---
@@ -1520,7 +1520,7 @@ token_policies: typing.List[str]
Generated Token's Policies.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_policies DataVaultGcpAuthBackendRole#token_policies}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_policies DataVaultGcpAuthBackendRole#token_policies}
---
@@ -1534,7 +1534,7 @@ token_ttl: typing.Union[int, float]
The initial ttl of the token to generate in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_ttl DataVaultGcpAuthBackendRole#token_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_ttl DataVaultGcpAuthBackendRole#token_ttl}
---
@@ -1548,7 +1548,7 @@ token_type: str
The type of token to generate, service or batch.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_type DataVaultGcpAuthBackendRole#token_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_type DataVaultGcpAuthBackendRole#token_type}
---
diff --git a/docs/dataVaultGcpAuthBackendRole.typescript.md b/docs/dataVaultGcpAuthBackendRole.typescript.md
index 288107cf..6ca00e08 100644
--- a/docs/dataVaultGcpAuthBackendRole.typescript.md
+++ b/docs/dataVaultGcpAuthBackendRole.typescript.md
@@ -4,7 +4,7 @@
### DataVaultGcpAuthBackendRole
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role vault_gcp_auth_backend_role}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role vault_gcp_auth_backend_role}.
#### Initializers
@@ -449,7 +449,7 @@ The construct id used in the generated config for the DataVaultGcpAuthBackendRol
The id of the existing DataVaultGcpAuthBackendRole that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#import import section} in the documentation of this resource for the id to use
---
@@ -1019,7 +1019,7 @@ const dataVaultGcpAuthBackendRoleConfig: dataVaultGcpAuthBackendRole.DataVaultGc
| provisioners
| cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[]
| *No description.* |
| roleName
| string
| Name of the role. |
| backend
| string
| Unique name of the auth backend to configure. |
-| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#id DataVaultGcpAuthBackendRole#id}. |
+| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#id DataVaultGcpAuthBackendRole#id}. |
| namespace
| string
| Target namespace. (requires Enterprise). |
| tokenBoundCidrs
| string[]
| Specifies the blocks of IP addresses which are allowed to use the generated token. |
| tokenExplicitMaxTtl
| number
| Generated Token's Explicit Maximum TTL in seconds. |
@@ -1113,7 +1113,7 @@ public readonly roleName: string;
Name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#role_name DataVaultGcpAuthBackendRole#role_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#role_name DataVaultGcpAuthBackendRole#role_name}
---
@@ -1127,7 +1127,7 @@ public readonly backend: string;
Unique name of the auth backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#backend DataVaultGcpAuthBackendRole#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#backend DataVaultGcpAuthBackendRole#backend}
---
@@ -1139,7 +1139,7 @@ public readonly id: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#id DataVaultGcpAuthBackendRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#id DataVaultGcpAuthBackendRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1156,7 +1156,7 @@ public readonly namespace: string;
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#namespace DataVaultGcpAuthBackendRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#namespace DataVaultGcpAuthBackendRole#namespace}
---
@@ -1170,7 +1170,7 @@ public readonly tokenBoundCidrs: string[];
Specifies the blocks of IP addresses which are allowed to use the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_bound_cidrs DataVaultGcpAuthBackendRole#token_bound_cidrs}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_bound_cidrs DataVaultGcpAuthBackendRole#token_bound_cidrs}
---
@@ -1184,7 +1184,7 @@ public readonly tokenExplicitMaxTtl: number;
Generated Token's Explicit Maximum TTL in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_explicit_max_ttl DataVaultGcpAuthBackendRole#token_explicit_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_explicit_max_ttl DataVaultGcpAuthBackendRole#token_explicit_max_ttl}
---
@@ -1198,7 +1198,7 @@ public readonly tokenMaxTtl: number;
The maximum lifetime of the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_max_ttl DataVaultGcpAuthBackendRole#token_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_max_ttl DataVaultGcpAuthBackendRole#token_max_ttl}
---
@@ -1212,7 +1212,7 @@ public readonly tokenNoDefaultPolicy: boolean | IResolvable;
If true, the 'default' policy will not automatically be added to generated tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_no_default_policy DataVaultGcpAuthBackendRole#token_no_default_policy}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_no_default_policy DataVaultGcpAuthBackendRole#token_no_default_policy}
---
@@ -1226,7 +1226,7 @@ public readonly tokenNumUses: number;
The maximum number of times a token may be used, a value of zero means unlimited.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_num_uses DataVaultGcpAuthBackendRole#token_num_uses}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_num_uses DataVaultGcpAuthBackendRole#token_num_uses}
---
@@ -1240,7 +1240,7 @@ public readonly tokenPeriod: number;
Generated Token's Period.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_period DataVaultGcpAuthBackendRole#token_period}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_period DataVaultGcpAuthBackendRole#token_period}
---
@@ -1254,7 +1254,7 @@ public readonly tokenPolicies: string[];
Generated Token's Policies.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_policies DataVaultGcpAuthBackendRole#token_policies}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_policies DataVaultGcpAuthBackendRole#token_policies}
---
@@ -1268,7 +1268,7 @@ public readonly tokenTtl: number;
The initial ttl of the token to generate in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_ttl DataVaultGcpAuthBackendRole#token_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_ttl DataVaultGcpAuthBackendRole#token_ttl}
---
@@ -1282,7 +1282,7 @@ public readonly tokenType: string;
The type of token to generate, service or batch.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_type DataVaultGcpAuthBackendRole#token_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_type DataVaultGcpAuthBackendRole#token_type}
---
diff --git a/docs/dataVaultGenericSecret.csharp.md b/docs/dataVaultGenericSecret.csharp.md
index ed441895..bdd3f30c 100644
--- a/docs/dataVaultGenericSecret.csharp.md
+++ b/docs/dataVaultGenericSecret.csharp.md
@@ -4,7 +4,7 @@
### DataVaultGenericSecret
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret vault_generic_secret}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret vault_generic_secret}.
#### Initializers
@@ -393,7 +393,7 @@ The construct id used in the generated config for the DataVaultGenericSecret to
The id of the existing DataVaultGenericSecret that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#import import section} in the documentation of this resource for the id to use
---
@@ -777,9 +777,9 @@ new DataVaultGenericSecretConfig {
| Provider
| HashiCorp.Cdktf.TerraformProvider
| *No description.* |
| Provisioners
| object[]
| *No description.* |
| Path
| string
| Full path from which a secret will be read. |
-| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#id DataVaultGenericSecret#id}. |
+| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#id DataVaultGenericSecret#id}. |
| Namespace
| string
| Target namespace. (requires Enterprise). |
-| Version
| double
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#version DataVaultGenericSecret#version}. |
+| Version
| double
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#version DataVaultGenericSecret#version}. |
| WithLeaseStartTime
| object
| If set to true, stores 'lease_start_time' in the TF state. |
---
@@ -864,7 +864,7 @@ public string Path { get; set; }
Full path from which a secret will be read.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#path DataVaultGenericSecret#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#path DataVaultGenericSecret#path}
---
@@ -876,7 +876,7 @@ public string Id { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#id DataVaultGenericSecret#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#id DataVaultGenericSecret#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -893,7 +893,7 @@ public string Namespace { get; set; }
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#namespace DataVaultGenericSecret#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#namespace DataVaultGenericSecret#namespace}
---
@@ -905,7 +905,7 @@ public double Version { get; set; }
- *Type:* double
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#version DataVaultGenericSecret#version}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#version DataVaultGenericSecret#version}.
---
@@ -919,7 +919,7 @@ public object WithLeaseStartTime { get; set; }
If set to true, stores 'lease_start_time' in the TF state.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#with_lease_start_time DataVaultGenericSecret#with_lease_start_time}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#with_lease_start_time DataVaultGenericSecret#with_lease_start_time}
---
diff --git a/docs/dataVaultGenericSecret.go.md b/docs/dataVaultGenericSecret.go.md
index 13957a06..0de58e07 100644
--- a/docs/dataVaultGenericSecret.go.md
+++ b/docs/dataVaultGenericSecret.go.md
@@ -4,7 +4,7 @@
### DataVaultGenericSecret
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret vault_generic_secret}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret vault_generic_secret}.
#### Initializers
@@ -393,7 +393,7 @@ The construct id used in the generated config for the DataVaultGenericSecret to
The id of the existing DataVaultGenericSecret that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#import import section} in the documentation of this resource for the id to use
---
@@ -777,9 +777,9 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultgenericsecre
| Provider
| github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProvider
| *No description.* |
| Provisioners
| *[]interface{}
| *No description.* |
| Path
| *string
| Full path from which a secret will be read. |
-| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#id DataVaultGenericSecret#id}. |
+| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#id DataVaultGenericSecret#id}. |
| Namespace
| *string
| Target namespace. (requires Enterprise). |
-| Version
| *f64
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#version DataVaultGenericSecret#version}. |
+| Version
| *f64
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#version DataVaultGenericSecret#version}. |
| WithLeaseStartTime
| interface{}
| If set to true, stores 'lease_start_time' in the TF state. |
---
@@ -864,7 +864,7 @@ Path *string
Full path from which a secret will be read.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#path DataVaultGenericSecret#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#path DataVaultGenericSecret#path}
---
@@ -876,7 +876,7 @@ Id *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#id DataVaultGenericSecret#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#id DataVaultGenericSecret#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -893,7 +893,7 @@ Namespace *string
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#namespace DataVaultGenericSecret#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#namespace DataVaultGenericSecret#namespace}
---
@@ -905,7 +905,7 @@ Version *f64
- *Type:* *f64
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#version DataVaultGenericSecret#version}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#version DataVaultGenericSecret#version}.
---
@@ -919,7 +919,7 @@ WithLeaseStartTime interface{}
If set to true, stores 'lease_start_time' in the TF state.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#with_lease_start_time DataVaultGenericSecret#with_lease_start_time}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#with_lease_start_time DataVaultGenericSecret#with_lease_start_time}
---
diff --git a/docs/dataVaultGenericSecret.java.md b/docs/dataVaultGenericSecret.java.md
index 31d00113..90da15d7 100644
--- a/docs/dataVaultGenericSecret.java.md
+++ b/docs/dataVaultGenericSecret.java.md
@@ -4,7 +4,7 @@
### DataVaultGenericSecret
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret vault_generic_secret}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret vault_generic_secret}.
#### Initializers
@@ -44,9 +44,9 @@ DataVaultGenericSecret.Builder.create(Construct scope, java.lang.String id)
| provider
| com.hashicorp.cdktf.TerraformProvider
| *No description.* |
| provisioners
| java.util.List
| *No description.* |
| path
| java.lang.String
| Full path from which a secret will be read. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#id DataVaultGenericSecret#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#id DataVaultGenericSecret#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
-| version
| java.lang.Number
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#version DataVaultGenericSecret#version}. |
+| version
| java.lang.Number
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#version DataVaultGenericSecret#version}. |
| withLeaseStartTime
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| If set to true, stores 'lease_start_time' in the TF state. |
---
@@ -117,7 +117,7 @@ Must be unique amongst siblings in the same scope
Full path from which a secret will be read.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#path DataVaultGenericSecret#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#path DataVaultGenericSecret#path}
---
@@ -125,7 +125,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#id DataVaultGenericSecret#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#id DataVaultGenericSecret#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -138,7 +138,7 @@ If you experience problems setting this value it might not be settable. Please t
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#namespace DataVaultGenericSecret#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#namespace DataVaultGenericSecret#namespace}
---
@@ -146,7 +146,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* java.lang.Number
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#version DataVaultGenericSecret#version}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#version DataVaultGenericSecret#version}.
---
@@ -156,7 +156,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
If set to true, stores 'lease_start_time' in the TF state.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#with_lease_start_time DataVaultGenericSecret#with_lease_start_time}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#with_lease_start_time DataVaultGenericSecret#with_lease_start_time}
---
@@ -507,7 +507,7 @@ The construct id used in the generated config for the DataVaultGenericSecret to
The id of the existing DataVaultGenericSecret that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#import import section} in the documentation of this resource for the id to use
---
@@ -896,9 +896,9 @@ DataVaultGenericSecretConfig.builder()
| provider
| com.hashicorp.cdktf.TerraformProvider
| *No description.* |
| provisioners
| java.util.List
| *No description.* |
| path
| java.lang.String
| Full path from which a secret will be read. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#id DataVaultGenericSecret#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#id DataVaultGenericSecret#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
-| version
| java.lang.Number
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#version DataVaultGenericSecret#version}. |
+| version
| java.lang.Number
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#version DataVaultGenericSecret#version}. |
| withLeaseStartTime
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| If set to true, stores 'lease_start_time' in the TF state. |
---
@@ -983,7 +983,7 @@ public java.lang.String getPath();
Full path from which a secret will be read.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#path DataVaultGenericSecret#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#path DataVaultGenericSecret#path}
---
@@ -995,7 +995,7 @@ public java.lang.String getId();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#id DataVaultGenericSecret#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#id DataVaultGenericSecret#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1012,7 +1012,7 @@ public java.lang.String getNamespace();
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#namespace DataVaultGenericSecret#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#namespace DataVaultGenericSecret#namespace}
---
@@ -1024,7 +1024,7 @@ public java.lang.Number getVersion();
- *Type:* java.lang.Number
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#version DataVaultGenericSecret#version}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#version DataVaultGenericSecret#version}.
---
@@ -1038,7 +1038,7 @@ public java.lang.Object getWithLeaseStartTime();
If set to true, stores 'lease_start_time' in the TF state.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#with_lease_start_time DataVaultGenericSecret#with_lease_start_time}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#with_lease_start_time DataVaultGenericSecret#with_lease_start_time}
---
diff --git a/docs/dataVaultGenericSecret.python.md b/docs/dataVaultGenericSecret.python.md
index 7531444c..acd9f589 100644
--- a/docs/dataVaultGenericSecret.python.md
+++ b/docs/dataVaultGenericSecret.python.md
@@ -4,7 +4,7 @@
### DataVaultGenericSecret
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret vault_generic_secret}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret vault_generic_secret}.
#### Initializers
@@ -41,9 +41,9 @@ dataVaultGenericSecret.DataVaultGenericSecret(
| provider
| cdktf.TerraformProvider
| *No description.* |
| provisioners
| typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]]
| *No description.* |
| path
| str
| Full path from which a secret will be read. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#id DataVaultGenericSecret#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#id DataVaultGenericSecret#id}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
-| version
| typing.Union[int, float]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#version DataVaultGenericSecret#version}. |
+| version
| typing.Union[int, float]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#version DataVaultGenericSecret#version}. |
| with_lease_start_time
| typing.Union[bool, cdktf.IResolvable]
| If set to true, stores 'lease_start_time' in the TF state. |
---
@@ -114,7 +114,7 @@ Must be unique amongst siblings in the same scope
Full path from which a secret will be read.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#path DataVaultGenericSecret#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#path DataVaultGenericSecret#path}
---
@@ -122,7 +122,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#id DataVaultGenericSecret#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#id DataVaultGenericSecret#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -135,7 +135,7 @@ If you experience problems setting this value it might not be settable. Please t
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#namespace DataVaultGenericSecret#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#namespace DataVaultGenericSecret#namespace}
---
@@ -143,7 +143,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* typing.Union[int, float]
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#version DataVaultGenericSecret#version}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#version DataVaultGenericSecret#version}.
---
@@ -153,7 +153,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
If set to true, stores 'lease_start_time' in the TF state.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#with_lease_start_time DataVaultGenericSecret#with_lease_start_time}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#with_lease_start_time DataVaultGenericSecret#with_lease_start_time}
---
@@ -540,7 +540,7 @@ The construct id used in the generated config for the DataVaultGenericSecret to
The id of the existing DataVaultGenericSecret that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#import import section} in the documentation of this resource for the id to use
---
@@ -924,9 +924,9 @@ dataVaultGenericSecret.DataVaultGenericSecretConfig(
| provider
| cdktf.TerraformProvider
| *No description.* |
| provisioners
| typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]]
| *No description.* |
| path
| str
| Full path from which a secret will be read. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#id DataVaultGenericSecret#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#id DataVaultGenericSecret#id}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
-| version
| typing.Union[int, float]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#version DataVaultGenericSecret#version}. |
+| version
| typing.Union[int, float]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#version DataVaultGenericSecret#version}. |
| with_lease_start_time
| typing.Union[bool, cdktf.IResolvable]
| If set to true, stores 'lease_start_time' in the TF state. |
---
@@ -1011,7 +1011,7 @@ path: str
Full path from which a secret will be read.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#path DataVaultGenericSecret#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#path DataVaultGenericSecret#path}
---
@@ -1023,7 +1023,7 @@ id: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#id DataVaultGenericSecret#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#id DataVaultGenericSecret#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1040,7 +1040,7 @@ namespace: str
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#namespace DataVaultGenericSecret#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#namespace DataVaultGenericSecret#namespace}
---
@@ -1052,7 +1052,7 @@ version: typing.Union[int, float]
- *Type:* typing.Union[int, float]
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#version DataVaultGenericSecret#version}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#version DataVaultGenericSecret#version}.
---
@@ -1066,7 +1066,7 @@ with_lease_start_time: typing.Union[bool, IResolvable]
If set to true, stores 'lease_start_time' in the TF state.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#with_lease_start_time DataVaultGenericSecret#with_lease_start_time}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#with_lease_start_time DataVaultGenericSecret#with_lease_start_time}
---
diff --git a/docs/dataVaultGenericSecret.typescript.md b/docs/dataVaultGenericSecret.typescript.md
index 0795df05..ada7d744 100644
--- a/docs/dataVaultGenericSecret.typescript.md
+++ b/docs/dataVaultGenericSecret.typescript.md
@@ -4,7 +4,7 @@
### DataVaultGenericSecret
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret vault_generic_secret}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret vault_generic_secret}.
#### Initializers
@@ -393,7 +393,7 @@ The construct id used in the generated config for the DataVaultGenericSecret to
The id of the existing DataVaultGenericSecret that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#import import section} in the documentation of this resource for the id to use
---
@@ -764,9 +764,9 @@ const dataVaultGenericSecretConfig: dataVaultGenericSecret.DataVaultGenericSecre
| provider
| cdktf.TerraformProvider
| *No description.* |
| provisioners
| cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[]
| *No description.* |
| path
| string
| Full path from which a secret will be read. |
-| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#id DataVaultGenericSecret#id}. |
+| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#id DataVaultGenericSecret#id}. |
| namespace
| string
| Target namespace. (requires Enterprise). |
-| version
| number
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#version DataVaultGenericSecret#version}. |
+| version
| number
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#version DataVaultGenericSecret#version}. |
| withLeaseStartTime
| boolean \| cdktf.IResolvable
| If set to true, stores 'lease_start_time' in the TF state. |
---
@@ -851,7 +851,7 @@ public readonly path: string;
Full path from which a secret will be read.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#path DataVaultGenericSecret#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#path DataVaultGenericSecret#path}
---
@@ -863,7 +863,7 @@ public readonly id: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#id DataVaultGenericSecret#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#id DataVaultGenericSecret#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -880,7 +880,7 @@ public readonly namespace: string;
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#namespace DataVaultGenericSecret#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#namespace DataVaultGenericSecret#namespace}
---
@@ -892,7 +892,7 @@ public readonly version: number;
- *Type:* number
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#version DataVaultGenericSecret#version}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#version DataVaultGenericSecret#version}.
---
@@ -906,7 +906,7 @@ public readonly withLeaseStartTime: boolean | IResolvable;
If set to true, stores 'lease_start_time' in the TF state.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#with_lease_start_time DataVaultGenericSecret#with_lease_start_time}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#with_lease_start_time DataVaultGenericSecret#with_lease_start_time}
---
diff --git a/docs/dataVaultIdentityEntity.csharp.md b/docs/dataVaultIdentityEntity.csharp.md
index d8258522..9f5416e2 100644
--- a/docs/dataVaultIdentityEntity.csharp.md
+++ b/docs/dataVaultIdentityEntity.csharp.md
@@ -4,7 +4,7 @@
### DataVaultIdentityEntity
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity vault_identity_entity}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity vault_identity_entity}.
#### Initializers
@@ -414,7 +414,7 @@ The construct id used in the generated config for the DataVaultIdentityEntity to
The id of the existing DataVaultIdentityEntity that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#import import section} in the documentation of this resource for the id to use
---
@@ -927,7 +927,7 @@ new DataVaultIdentityEntityConfig {
| AliasName
| string
| Name of the alias. This should be supplied in conjunction with `alias_mount_accessor`. |
| EntityId
| string
| ID of the entity. |
| EntityName
| string
| Name of the entity. |
-| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#id DataVaultIdentityEntity#id}. |
+| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#id DataVaultIdentityEntity#id}. |
| Namespace
| string
| Target namespace. (requires Enterprise). |
---
@@ -1012,7 +1012,7 @@ public string AliasId { get; set; }
ID of the alias.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#alias_id DataVaultIdentityEntity#alias_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#alias_id DataVaultIdentityEntity#alias_id}
---
@@ -1026,7 +1026,7 @@ public string AliasMountAccessor { get; set; }
Accessor of the mount to which the alias belongs to. This should be supplied in conjunction with `alias_name`.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#alias_mount_accessor DataVaultIdentityEntity#alias_mount_accessor}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#alias_mount_accessor DataVaultIdentityEntity#alias_mount_accessor}
---
@@ -1040,7 +1040,7 @@ public string AliasName { get; set; }
Name of the alias. This should be supplied in conjunction with `alias_mount_accessor`.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#alias_name DataVaultIdentityEntity#alias_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#alias_name DataVaultIdentityEntity#alias_name}
---
@@ -1054,7 +1054,7 @@ public string EntityId { get; set; }
ID of the entity.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#entity_id DataVaultIdentityEntity#entity_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#entity_id DataVaultIdentityEntity#entity_id}
---
@@ -1068,7 +1068,7 @@ public string EntityName { get; set; }
Name of the entity.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#entity_name DataVaultIdentityEntity#entity_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#entity_name DataVaultIdentityEntity#entity_name}
---
@@ -1080,7 +1080,7 @@ public string Id { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#id DataVaultIdentityEntity#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#id DataVaultIdentityEntity#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1097,7 +1097,7 @@ public string Namespace { get; set; }
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#namespace DataVaultIdentityEntity#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#namespace DataVaultIdentityEntity#namespace}
---
diff --git a/docs/dataVaultIdentityEntity.go.md b/docs/dataVaultIdentityEntity.go.md
index f6d2f251..b8ca3443 100644
--- a/docs/dataVaultIdentityEntity.go.md
+++ b/docs/dataVaultIdentityEntity.go.md
@@ -4,7 +4,7 @@
### DataVaultIdentityEntity
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity vault_identity_entity}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity vault_identity_entity}.
#### Initializers
@@ -414,7 +414,7 @@ The construct id used in the generated config for the DataVaultIdentityEntity to
The id of the existing DataVaultIdentityEntity that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#import import section} in the documentation of this resource for the id to use
---
@@ -927,7 +927,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultidentityenti
| AliasName
| *string
| Name of the alias. This should be supplied in conjunction with `alias_mount_accessor`. |
| EntityId
| *string
| ID of the entity. |
| EntityName
| *string
| Name of the entity. |
-| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#id DataVaultIdentityEntity#id}. |
+| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#id DataVaultIdentityEntity#id}. |
| Namespace
| *string
| Target namespace. (requires Enterprise). |
---
@@ -1012,7 +1012,7 @@ AliasId *string
ID of the alias.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#alias_id DataVaultIdentityEntity#alias_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#alias_id DataVaultIdentityEntity#alias_id}
---
@@ -1026,7 +1026,7 @@ AliasMountAccessor *string
Accessor of the mount to which the alias belongs to. This should be supplied in conjunction with `alias_name`.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#alias_mount_accessor DataVaultIdentityEntity#alias_mount_accessor}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#alias_mount_accessor DataVaultIdentityEntity#alias_mount_accessor}
---
@@ -1040,7 +1040,7 @@ AliasName *string
Name of the alias. This should be supplied in conjunction with `alias_mount_accessor`.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#alias_name DataVaultIdentityEntity#alias_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#alias_name DataVaultIdentityEntity#alias_name}
---
@@ -1054,7 +1054,7 @@ EntityId *string
ID of the entity.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#entity_id DataVaultIdentityEntity#entity_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#entity_id DataVaultIdentityEntity#entity_id}
---
@@ -1068,7 +1068,7 @@ EntityName *string
Name of the entity.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#entity_name DataVaultIdentityEntity#entity_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#entity_name DataVaultIdentityEntity#entity_name}
---
@@ -1080,7 +1080,7 @@ Id *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#id DataVaultIdentityEntity#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#id DataVaultIdentityEntity#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1097,7 +1097,7 @@ Namespace *string
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#namespace DataVaultIdentityEntity#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#namespace DataVaultIdentityEntity#namespace}
---
diff --git a/docs/dataVaultIdentityEntity.java.md b/docs/dataVaultIdentityEntity.java.md
index a6c1653b..3e262489 100644
--- a/docs/dataVaultIdentityEntity.java.md
+++ b/docs/dataVaultIdentityEntity.java.md
@@ -4,7 +4,7 @@
### DataVaultIdentityEntity
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity vault_identity_entity}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity vault_identity_entity}.
#### Initializers
@@ -49,7 +49,7 @@ DataVaultIdentityEntity.Builder.create(Construct scope, java.lang.String id)
| aliasName
| java.lang.String
| Name of the alias. This should be supplied in conjunction with `alias_mount_accessor`. |
| entityId
| java.lang.String
| ID of the entity. |
| entityName
| java.lang.String
| Name of the entity. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#id DataVaultIdentityEntity#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#id DataVaultIdentityEntity#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
---
@@ -120,7 +120,7 @@ Must be unique amongst siblings in the same scope
ID of the alias.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#alias_id DataVaultIdentityEntity#alias_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#alias_id DataVaultIdentityEntity#alias_id}
---
@@ -130,7 +130,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Accessor of the mount to which the alias belongs to. This should be supplied in conjunction with `alias_name`.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#alias_mount_accessor DataVaultIdentityEntity#alias_mount_accessor}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#alias_mount_accessor DataVaultIdentityEntity#alias_mount_accessor}
---
@@ -140,7 +140,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Name of the alias. This should be supplied in conjunction with `alias_mount_accessor`.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#alias_name DataVaultIdentityEntity#alias_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#alias_name DataVaultIdentityEntity#alias_name}
---
@@ -150,7 +150,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
ID of the entity.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#entity_id DataVaultIdentityEntity#entity_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#entity_id DataVaultIdentityEntity#entity_id}
---
@@ -160,7 +160,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Name of the entity.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#entity_name DataVaultIdentityEntity#entity_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#entity_name DataVaultIdentityEntity#entity_name}
---
@@ -168,7 +168,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#id DataVaultIdentityEntity#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#id DataVaultIdentityEntity#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -181,7 +181,7 @@ If you experience problems setting this value it might not be settable. Please t
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#namespace DataVaultIdentityEntity#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#namespace DataVaultIdentityEntity#namespace}
---
@@ -553,7 +553,7 @@ The construct id used in the generated config for the DataVaultIdentityEntity to
The id of the existing DataVaultIdentityEntity that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#import import section} in the documentation of this resource for the id to use
---
@@ -1069,7 +1069,7 @@ DataVaultIdentityEntityConfig.builder()
| aliasName
| java.lang.String
| Name of the alias. This should be supplied in conjunction with `alias_mount_accessor`. |
| entityId
| java.lang.String
| ID of the entity. |
| entityName
| java.lang.String
| Name of the entity. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#id DataVaultIdentityEntity#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#id DataVaultIdentityEntity#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
---
@@ -1154,7 +1154,7 @@ public java.lang.String getAliasId();
ID of the alias.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#alias_id DataVaultIdentityEntity#alias_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#alias_id DataVaultIdentityEntity#alias_id}
---
@@ -1168,7 +1168,7 @@ public java.lang.String getAliasMountAccessor();
Accessor of the mount to which the alias belongs to. This should be supplied in conjunction with `alias_name`.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#alias_mount_accessor DataVaultIdentityEntity#alias_mount_accessor}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#alias_mount_accessor DataVaultIdentityEntity#alias_mount_accessor}
---
@@ -1182,7 +1182,7 @@ public java.lang.String getAliasName();
Name of the alias. This should be supplied in conjunction with `alias_mount_accessor`.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#alias_name DataVaultIdentityEntity#alias_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#alias_name DataVaultIdentityEntity#alias_name}
---
@@ -1196,7 +1196,7 @@ public java.lang.String getEntityId();
ID of the entity.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#entity_id DataVaultIdentityEntity#entity_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#entity_id DataVaultIdentityEntity#entity_id}
---
@@ -1210,7 +1210,7 @@ public java.lang.String getEntityName();
Name of the entity.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#entity_name DataVaultIdentityEntity#entity_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#entity_name DataVaultIdentityEntity#entity_name}
---
@@ -1222,7 +1222,7 @@ public java.lang.String getId();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#id DataVaultIdentityEntity#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#id DataVaultIdentityEntity#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1239,7 +1239,7 @@ public java.lang.String getNamespace();
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#namespace DataVaultIdentityEntity#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#namespace DataVaultIdentityEntity#namespace}
---
diff --git a/docs/dataVaultIdentityEntity.python.md b/docs/dataVaultIdentityEntity.python.md
index d6e74649..35e65276 100644
--- a/docs/dataVaultIdentityEntity.python.md
+++ b/docs/dataVaultIdentityEntity.python.md
@@ -4,7 +4,7 @@
### DataVaultIdentityEntity
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity vault_identity_entity}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity vault_identity_entity}.
#### Initializers
@@ -47,7 +47,7 @@ dataVaultIdentityEntity.DataVaultIdentityEntity(
| alias_name
| str
| Name of the alias. This should be supplied in conjunction with `alias_mount_accessor`. |
| entity_id
| str
| ID of the entity. |
| entity_name
| str
| Name of the entity. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#id DataVaultIdentityEntity#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#id DataVaultIdentityEntity#id}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
---
@@ -118,7 +118,7 @@ Must be unique amongst siblings in the same scope
ID of the alias.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#alias_id DataVaultIdentityEntity#alias_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#alias_id DataVaultIdentityEntity#alias_id}
---
@@ -128,7 +128,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Accessor of the mount to which the alias belongs to. This should be supplied in conjunction with `alias_name`.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#alias_mount_accessor DataVaultIdentityEntity#alias_mount_accessor}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#alias_mount_accessor DataVaultIdentityEntity#alias_mount_accessor}
---
@@ -138,7 +138,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Name of the alias. This should be supplied in conjunction with `alias_mount_accessor`.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#alias_name DataVaultIdentityEntity#alias_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#alias_name DataVaultIdentityEntity#alias_name}
---
@@ -148,7 +148,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
ID of the entity.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#entity_id DataVaultIdentityEntity#entity_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#entity_id DataVaultIdentityEntity#entity_id}
---
@@ -158,7 +158,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Name of the entity.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#entity_name DataVaultIdentityEntity#entity_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#entity_name DataVaultIdentityEntity#entity_name}
---
@@ -166,7 +166,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#id DataVaultIdentityEntity#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#id DataVaultIdentityEntity#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -179,7 +179,7 @@ If you experience problems setting this value it might not be settable. Please t
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#namespace DataVaultIdentityEntity#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#namespace DataVaultIdentityEntity#namespace}
---
@@ -587,7 +587,7 @@ The construct id used in the generated config for the DataVaultIdentityEntity to
The id of the existing DataVaultIdentityEntity that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#import import section} in the documentation of this resource for the id to use
---
@@ -1098,7 +1098,7 @@ dataVaultIdentityEntity.DataVaultIdentityEntityConfig(
| alias_name
| str
| Name of the alias. This should be supplied in conjunction with `alias_mount_accessor`. |
| entity_id
| str
| ID of the entity. |
| entity_name
| str
| Name of the entity. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#id DataVaultIdentityEntity#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#id DataVaultIdentityEntity#id}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
---
@@ -1183,7 +1183,7 @@ alias_id: str
ID of the alias.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#alias_id DataVaultIdentityEntity#alias_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#alias_id DataVaultIdentityEntity#alias_id}
---
@@ -1197,7 +1197,7 @@ alias_mount_accessor: str
Accessor of the mount to which the alias belongs to. This should be supplied in conjunction with `alias_name`.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#alias_mount_accessor DataVaultIdentityEntity#alias_mount_accessor}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#alias_mount_accessor DataVaultIdentityEntity#alias_mount_accessor}
---
@@ -1211,7 +1211,7 @@ alias_name: str
Name of the alias. This should be supplied in conjunction with `alias_mount_accessor`.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#alias_name DataVaultIdentityEntity#alias_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#alias_name DataVaultIdentityEntity#alias_name}
---
@@ -1225,7 +1225,7 @@ entity_id: str
ID of the entity.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#entity_id DataVaultIdentityEntity#entity_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#entity_id DataVaultIdentityEntity#entity_id}
---
@@ -1239,7 +1239,7 @@ entity_name: str
Name of the entity.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#entity_name DataVaultIdentityEntity#entity_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#entity_name DataVaultIdentityEntity#entity_name}
---
@@ -1251,7 +1251,7 @@ id: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#id DataVaultIdentityEntity#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#id DataVaultIdentityEntity#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1268,7 +1268,7 @@ namespace: str
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#namespace DataVaultIdentityEntity#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#namespace DataVaultIdentityEntity#namespace}
---
diff --git a/docs/dataVaultIdentityEntity.typescript.md b/docs/dataVaultIdentityEntity.typescript.md
index c7c0a728..dcdb1015 100644
--- a/docs/dataVaultIdentityEntity.typescript.md
+++ b/docs/dataVaultIdentityEntity.typescript.md
@@ -4,7 +4,7 @@
### DataVaultIdentityEntity
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity vault_identity_entity}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity vault_identity_entity}.
#### Initializers
@@ -414,7 +414,7 @@ The construct id used in the generated config for the DataVaultIdentityEntity to
The id of the existing DataVaultIdentityEntity that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#import import section} in the documentation of this resource for the id to use
---
@@ -910,7 +910,7 @@ const dataVaultIdentityEntityConfig: dataVaultIdentityEntity.DataVaultIdentityEn
| aliasName
| string
| Name of the alias. This should be supplied in conjunction with `alias_mount_accessor`. |
| entityId
| string
| ID of the entity. |
| entityName
| string
| Name of the entity. |
-| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#id DataVaultIdentityEntity#id}. |
+| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#id DataVaultIdentityEntity#id}. |
| namespace
| string
| Target namespace. (requires Enterprise). |
---
@@ -995,7 +995,7 @@ public readonly aliasId: string;
ID of the alias.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#alias_id DataVaultIdentityEntity#alias_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#alias_id DataVaultIdentityEntity#alias_id}
---
@@ -1009,7 +1009,7 @@ public readonly aliasMountAccessor: string;
Accessor of the mount to which the alias belongs to. This should be supplied in conjunction with `alias_name`.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#alias_mount_accessor DataVaultIdentityEntity#alias_mount_accessor}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#alias_mount_accessor DataVaultIdentityEntity#alias_mount_accessor}
---
@@ -1023,7 +1023,7 @@ public readonly aliasName: string;
Name of the alias. This should be supplied in conjunction with `alias_mount_accessor`.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#alias_name DataVaultIdentityEntity#alias_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#alias_name DataVaultIdentityEntity#alias_name}
---
@@ -1037,7 +1037,7 @@ public readonly entityId: string;
ID of the entity.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#entity_id DataVaultIdentityEntity#entity_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#entity_id DataVaultIdentityEntity#entity_id}
---
@@ -1051,7 +1051,7 @@ public readonly entityName: string;
Name of the entity.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#entity_name DataVaultIdentityEntity#entity_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#entity_name DataVaultIdentityEntity#entity_name}
---
@@ -1063,7 +1063,7 @@ public readonly id: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#id DataVaultIdentityEntity#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#id DataVaultIdentityEntity#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1080,7 +1080,7 @@ public readonly namespace: string;
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#namespace DataVaultIdentityEntity#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#namespace DataVaultIdentityEntity#namespace}
---
diff --git a/docs/dataVaultIdentityGroup.csharp.md b/docs/dataVaultIdentityGroup.csharp.md
index 62150728..f9b2503f 100644
--- a/docs/dataVaultIdentityGroup.csharp.md
+++ b/docs/dataVaultIdentityGroup.csharp.md
@@ -4,7 +4,7 @@
### DataVaultIdentityGroup
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group vault_identity_group}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group vault_identity_group}.
#### Initializers
@@ -414,7 +414,7 @@ The construct id used in the generated config for the DataVaultIdentityGroup to
The id of the existing DataVaultIdentityGroup that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#import import section} in the documentation of this resource for the id to use
---
@@ -980,7 +980,7 @@ new DataVaultIdentityGroupConfig {
| AliasName
| string
| Name of the alias. This should be supplied in conjunction with `alias_mount_accessor`. |
| GroupId
| string
| ID of the group. |
| GroupName
| string
| Name of the group. |
-| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#id DataVaultIdentityGroup#id}. |
+| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#id DataVaultIdentityGroup#id}. |
| Namespace
| string
| Target namespace. (requires Enterprise). |
---
@@ -1065,7 +1065,7 @@ public string AliasId { get; set; }
ID of the alias.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#alias_id DataVaultIdentityGroup#alias_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#alias_id DataVaultIdentityGroup#alias_id}
---
@@ -1079,7 +1079,7 @@ public string AliasMountAccessor { get; set; }
Accessor of the mount to which the alias belongs to. This should be supplied in conjunction with `alias_name`.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#alias_mount_accessor DataVaultIdentityGroup#alias_mount_accessor}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#alias_mount_accessor DataVaultIdentityGroup#alias_mount_accessor}
---
@@ -1093,7 +1093,7 @@ public string AliasName { get; set; }
Name of the alias. This should be supplied in conjunction with `alias_mount_accessor`.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#alias_name DataVaultIdentityGroup#alias_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#alias_name DataVaultIdentityGroup#alias_name}
---
@@ -1107,7 +1107,7 @@ public string GroupId { get; set; }
ID of the group.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#group_id DataVaultIdentityGroup#group_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#group_id DataVaultIdentityGroup#group_id}
---
@@ -1121,7 +1121,7 @@ public string GroupName { get; set; }
Name of the group.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#group_name DataVaultIdentityGroup#group_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#group_name DataVaultIdentityGroup#group_name}
---
@@ -1133,7 +1133,7 @@ public string Id { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#id DataVaultIdentityGroup#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#id DataVaultIdentityGroup#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1150,7 +1150,7 @@ public string Namespace { get; set; }
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#namespace DataVaultIdentityGroup#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#namespace DataVaultIdentityGroup#namespace}
---
diff --git a/docs/dataVaultIdentityGroup.go.md b/docs/dataVaultIdentityGroup.go.md
index 1226374d..68fc4a93 100644
--- a/docs/dataVaultIdentityGroup.go.md
+++ b/docs/dataVaultIdentityGroup.go.md
@@ -4,7 +4,7 @@
### DataVaultIdentityGroup
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group vault_identity_group}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group vault_identity_group}.
#### Initializers
@@ -414,7 +414,7 @@ The construct id used in the generated config for the DataVaultIdentityGroup to
The id of the existing DataVaultIdentityGroup that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#import import section} in the documentation of this resource for the id to use
---
@@ -980,7 +980,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultidentitygrou
| AliasName
| *string
| Name of the alias. This should be supplied in conjunction with `alias_mount_accessor`. |
| GroupId
| *string
| ID of the group. |
| GroupName
| *string
| Name of the group. |
-| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#id DataVaultIdentityGroup#id}. |
+| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#id DataVaultIdentityGroup#id}. |
| Namespace
| *string
| Target namespace. (requires Enterprise). |
---
@@ -1065,7 +1065,7 @@ AliasId *string
ID of the alias.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#alias_id DataVaultIdentityGroup#alias_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#alias_id DataVaultIdentityGroup#alias_id}
---
@@ -1079,7 +1079,7 @@ AliasMountAccessor *string
Accessor of the mount to which the alias belongs to. This should be supplied in conjunction with `alias_name`.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#alias_mount_accessor DataVaultIdentityGroup#alias_mount_accessor}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#alias_mount_accessor DataVaultIdentityGroup#alias_mount_accessor}
---
@@ -1093,7 +1093,7 @@ AliasName *string
Name of the alias. This should be supplied in conjunction with `alias_mount_accessor`.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#alias_name DataVaultIdentityGroup#alias_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#alias_name DataVaultIdentityGroup#alias_name}
---
@@ -1107,7 +1107,7 @@ GroupId *string
ID of the group.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#group_id DataVaultIdentityGroup#group_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#group_id DataVaultIdentityGroup#group_id}
---
@@ -1121,7 +1121,7 @@ GroupName *string
Name of the group.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#group_name DataVaultIdentityGroup#group_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#group_name DataVaultIdentityGroup#group_name}
---
@@ -1133,7 +1133,7 @@ Id *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#id DataVaultIdentityGroup#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#id DataVaultIdentityGroup#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1150,7 +1150,7 @@ Namespace *string
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#namespace DataVaultIdentityGroup#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#namespace DataVaultIdentityGroup#namespace}
---
diff --git a/docs/dataVaultIdentityGroup.java.md b/docs/dataVaultIdentityGroup.java.md
index b89089d4..8e863fc7 100644
--- a/docs/dataVaultIdentityGroup.java.md
+++ b/docs/dataVaultIdentityGroup.java.md
@@ -4,7 +4,7 @@
### DataVaultIdentityGroup
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group vault_identity_group}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group vault_identity_group}.
#### Initializers
@@ -49,7 +49,7 @@ DataVaultIdentityGroup.Builder.create(Construct scope, java.lang.String id)
| aliasName
| java.lang.String
| Name of the alias. This should be supplied in conjunction with `alias_mount_accessor`. |
| groupId
| java.lang.String
| ID of the group. |
| groupName
| java.lang.String
| Name of the group. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#id DataVaultIdentityGroup#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#id DataVaultIdentityGroup#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
---
@@ -120,7 +120,7 @@ Must be unique amongst siblings in the same scope
ID of the alias.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#alias_id DataVaultIdentityGroup#alias_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#alias_id DataVaultIdentityGroup#alias_id}
---
@@ -130,7 +130,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Accessor of the mount to which the alias belongs to. This should be supplied in conjunction with `alias_name`.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#alias_mount_accessor DataVaultIdentityGroup#alias_mount_accessor}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#alias_mount_accessor DataVaultIdentityGroup#alias_mount_accessor}
---
@@ -140,7 +140,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Name of the alias. This should be supplied in conjunction with `alias_mount_accessor`.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#alias_name DataVaultIdentityGroup#alias_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#alias_name DataVaultIdentityGroup#alias_name}
---
@@ -150,7 +150,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
ID of the group.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#group_id DataVaultIdentityGroup#group_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#group_id DataVaultIdentityGroup#group_id}
---
@@ -160,7 +160,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Name of the group.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#group_name DataVaultIdentityGroup#group_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#group_name DataVaultIdentityGroup#group_name}
---
@@ -168,7 +168,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#id DataVaultIdentityGroup#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#id DataVaultIdentityGroup#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -181,7 +181,7 @@ If you experience problems setting this value it might not be settable. Please t
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#namespace DataVaultIdentityGroup#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#namespace DataVaultIdentityGroup#namespace}
---
@@ -553,7 +553,7 @@ The construct id used in the generated config for the DataVaultIdentityGroup to
The id of the existing DataVaultIdentityGroup that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#import import section} in the documentation of this resource for the id to use
---
@@ -1123,7 +1123,7 @@ DataVaultIdentityGroupConfig.builder()
| aliasName
| java.lang.String
| Name of the alias. This should be supplied in conjunction with `alias_mount_accessor`. |
| groupId
| java.lang.String
| ID of the group. |
| groupName
| java.lang.String
| Name of the group. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#id DataVaultIdentityGroup#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#id DataVaultIdentityGroup#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
---
@@ -1208,7 +1208,7 @@ public java.lang.String getAliasId();
ID of the alias.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#alias_id DataVaultIdentityGroup#alias_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#alias_id DataVaultIdentityGroup#alias_id}
---
@@ -1222,7 +1222,7 @@ public java.lang.String getAliasMountAccessor();
Accessor of the mount to which the alias belongs to. This should be supplied in conjunction with `alias_name`.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#alias_mount_accessor DataVaultIdentityGroup#alias_mount_accessor}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#alias_mount_accessor DataVaultIdentityGroup#alias_mount_accessor}
---
@@ -1236,7 +1236,7 @@ public java.lang.String getAliasName();
Name of the alias. This should be supplied in conjunction with `alias_mount_accessor`.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#alias_name DataVaultIdentityGroup#alias_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#alias_name DataVaultIdentityGroup#alias_name}
---
@@ -1250,7 +1250,7 @@ public java.lang.String getGroupId();
ID of the group.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#group_id DataVaultIdentityGroup#group_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#group_id DataVaultIdentityGroup#group_id}
---
@@ -1264,7 +1264,7 @@ public java.lang.String getGroupName();
Name of the group.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#group_name DataVaultIdentityGroup#group_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#group_name DataVaultIdentityGroup#group_name}
---
@@ -1276,7 +1276,7 @@ public java.lang.String getId();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#id DataVaultIdentityGroup#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#id DataVaultIdentityGroup#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1293,7 +1293,7 @@ public java.lang.String getNamespace();
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#namespace DataVaultIdentityGroup#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#namespace DataVaultIdentityGroup#namespace}
---
diff --git a/docs/dataVaultIdentityGroup.python.md b/docs/dataVaultIdentityGroup.python.md
index 39db4841..67451418 100644
--- a/docs/dataVaultIdentityGroup.python.md
+++ b/docs/dataVaultIdentityGroup.python.md
@@ -4,7 +4,7 @@
### DataVaultIdentityGroup
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group vault_identity_group}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group vault_identity_group}.
#### Initializers
@@ -47,7 +47,7 @@ dataVaultIdentityGroup.DataVaultIdentityGroup(
| alias_name
| str
| Name of the alias. This should be supplied in conjunction with `alias_mount_accessor`. |
| group_id
| str
| ID of the group. |
| group_name
| str
| Name of the group. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#id DataVaultIdentityGroup#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#id DataVaultIdentityGroup#id}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
---
@@ -118,7 +118,7 @@ Must be unique amongst siblings in the same scope
ID of the alias.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#alias_id DataVaultIdentityGroup#alias_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#alias_id DataVaultIdentityGroup#alias_id}
---
@@ -128,7 +128,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Accessor of the mount to which the alias belongs to. This should be supplied in conjunction with `alias_name`.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#alias_mount_accessor DataVaultIdentityGroup#alias_mount_accessor}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#alias_mount_accessor DataVaultIdentityGroup#alias_mount_accessor}
---
@@ -138,7 +138,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Name of the alias. This should be supplied in conjunction with `alias_mount_accessor`.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#alias_name DataVaultIdentityGroup#alias_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#alias_name DataVaultIdentityGroup#alias_name}
---
@@ -148,7 +148,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
ID of the group.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#group_id DataVaultIdentityGroup#group_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#group_id DataVaultIdentityGroup#group_id}
---
@@ -158,7 +158,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Name of the group.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#group_name DataVaultIdentityGroup#group_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#group_name DataVaultIdentityGroup#group_name}
---
@@ -166,7 +166,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#id DataVaultIdentityGroup#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#id DataVaultIdentityGroup#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -179,7 +179,7 @@ If you experience problems setting this value it might not be settable. Please t
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#namespace DataVaultIdentityGroup#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#namespace DataVaultIdentityGroup#namespace}
---
@@ -587,7 +587,7 @@ The construct id used in the generated config for the DataVaultIdentityGroup to
The id of the existing DataVaultIdentityGroup that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#import import section} in the documentation of this resource for the id to use
---
@@ -1153,7 +1153,7 @@ dataVaultIdentityGroup.DataVaultIdentityGroupConfig(
| alias_name
| str
| Name of the alias. This should be supplied in conjunction with `alias_mount_accessor`. |
| group_id
| str
| ID of the group. |
| group_name
| str
| Name of the group. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#id DataVaultIdentityGroup#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#id DataVaultIdentityGroup#id}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
---
@@ -1238,7 +1238,7 @@ alias_id: str
ID of the alias.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#alias_id DataVaultIdentityGroup#alias_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#alias_id DataVaultIdentityGroup#alias_id}
---
@@ -1252,7 +1252,7 @@ alias_mount_accessor: str
Accessor of the mount to which the alias belongs to. This should be supplied in conjunction with `alias_name`.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#alias_mount_accessor DataVaultIdentityGroup#alias_mount_accessor}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#alias_mount_accessor DataVaultIdentityGroup#alias_mount_accessor}
---
@@ -1266,7 +1266,7 @@ alias_name: str
Name of the alias. This should be supplied in conjunction with `alias_mount_accessor`.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#alias_name DataVaultIdentityGroup#alias_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#alias_name DataVaultIdentityGroup#alias_name}
---
@@ -1280,7 +1280,7 @@ group_id: str
ID of the group.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#group_id DataVaultIdentityGroup#group_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#group_id DataVaultIdentityGroup#group_id}
---
@@ -1294,7 +1294,7 @@ group_name: str
Name of the group.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#group_name DataVaultIdentityGroup#group_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#group_name DataVaultIdentityGroup#group_name}
---
@@ -1306,7 +1306,7 @@ id: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#id DataVaultIdentityGroup#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#id DataVaultIdentityGroup#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1323,7 +1323,7 @@ namespace: str
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#namespace DataVaultIdentityGroup#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#namespace DataVaultIdentityGroup#namespace}
---
diff --git a/docs/dataVaultIdentityGroup.typescript.md b/docs/dataVaultIdentityGroup.typescript.md
index b29dde65..967548a0 100644
--- a/docs/dataVaultIdentityGroup.typescript.md
+++ b/docs/dataVaultIdentityGroup.typescript.md
@@ -4,7 +4,7 @@
### DataVaultIdentityGroup
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group vault_identity_group}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group vault_identity_group}.
#### Initializers
@@ -414,7 +414,7 @@ The construct id used in the generated config for the DataVaultIdentityGroup to
The id of the existing DataVaultIdentityGroup that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#import import section} in the documentation of this resource for the id to use
---
@@ -965,7 +965,7 @@ const dataVaultIdentityGroupConfig: dataVaultIdentityGroup.DataVaultIdentityGrou
| aliasName
| string
| Name of the alias. This should be supplied in conjunction with `alias_mount_accessor`. |
| groupId
| string
| ID of the group. |
| groupName
| string
| Name of the group. |
-| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#id DataVaultIdentityGroup#id}. |
+| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#id DataVaultIdentityGroup#id}. |
| namespace
| string
| Target namespace. (requires Enterprise). |
---
@@ -1050,7 +1050,7 @@ public readonly aliasId: string;
ID of the alias.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#alias_id DataVaultIdentityGroup#alias_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#alias_id DataVaultIdentityGroup#alias_id}
---
@@ -1064,7 +1064,7 @@ public readonly aliasMountAccessor: string;
Accessor of the mount to which the alias belongs to. This should be supplied in conjunction with `alias_name`.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#alias_mount_accessor DataVaultIdentityGroup#alias_mount_accessor}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#alias_mount_accessor DataVaultIdentityGroup#alias_mount_accessor}
---
@@ -1078,7 +1078,7 @@ public readonly aliasName: string;
Name of the alias. This should be supplied in conjunction with `alias_mount_accessor`.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#alias_name DataVaultIdentityGroup#alias_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#alias_name DataVaultIdentityGroup#alias_name}
---
@@ -1092,7 +1092,7 @@ public readonly groupId: string;
ID of the group.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#group_id DataVaultIdentityGroup#group_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#group_id DataVaultIdentityGroup#group_id}
---
@@ -1106,7 +1106,7 @@ public readonly groupName: string;
Name of the group.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#group_name DataVaultIdentityGroup#group_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#group_name DataVaultIdentityGroup#group_name}
---
@@ -1118,7 +1118,7 @@ public readonly id: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#id DataVaultIdentityGroup#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#id DataVaultIdentityGroup#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1135,7 +1135,7 @@ public readonly namespace: string;
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#namespace DataVaultIdentityGroup#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#namespace DataVaultIdentityGroup#namespace}
---
diff --git a/docs/dataVaultIdentityOidcClientCreds.csharp.md b/docs/dataVaultIdentityOidcClientCreds.csharp.md
index 4a4cbdb4..39cb5533 100644
--- a/docs/dataVaultIdentityOidcClientCreds.csharp.md
+++ b/docs/dataVaultIdentityOidcClientCreds.csharp.md
@@ -4,7 +4,7 @@
### DataVaultIdentityOidcClientCreds
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_client_creds vault_identity_oidc_client_creds}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_client_creds vault_identity_oidc_client_creds}.
#### Initializers
@@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultIdentityOidcClien
The id of the existing DataVaultIdentityOidcClientCreds that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_client_creds#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_client_creds#import import section} in the documentation of this resource for the id to use
---
@@ -673,7 +673,7 @@ new DataVaultIdentityOidcClientCredsConfig {
| Provider
| HashiCorp.Cdktf.TerraformProvider
| *No description.* |
| Provisioners
| object[]
| *No description.* |
| Name
| string
| The name of the client. |
-| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_client_creds#id DataVaultIdentityOidcClientCreds#id}. |
+| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_client_creds#id DataVaultIdentityOidcClientCreds#id}. |
| Namespace
| string
| Target namespace. (requires Enterprise). |
---
@@ -758,7 +758,7 @@ public string Name { get; set; }
The name of the client.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_client_creds#name DataVaultIdentityOidcClientCreds#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_client_creds#name DataVaultIdentityOidcClientCreds#name}
---
@@ -770,7 +770,7 @@ public string Id { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_client_creds#id DataVaultIdentityOidcClientCreds#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_client_creds#id DataVaultIdentityOidcClientCreds#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -787,7 +787,7 @@ public string Namespace { get; set; }
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_client_creds#namespace DataVaultIdentityOidcClientCreds#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_client_creds#namespace DataVaultIdentityOidcClientCreds#namespace}
---
diff --git a/docs/dataVaultIdentityOidcClientCreds.go.md b/docs/dataVaultIdentityOidcClientCreds.go.md
index 31db0394..b557b227 100644
--- a/docs/dataVaultIdentityOidcClientCreds.go.md
+++ b/docs/dataVaultIdentityOidcClientCreds.go.md
@@ -4,7 +4,7 @@
### DataVaultIdentityOidcClientCreds
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_client_creds vault_identity_oidc_client_creds}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_client_creds vault_identity_oidc_client_creds}.
#### Initializers
@@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultIdentityOidcClien
The id of the existing DataVaultIdentityOidcClientCreds that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_client_creds#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_client_creds#import import section} in the documentation of this resource for the id to use
---
@@ -673,7 +673,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultidentityoidc
| Provider
| github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProvider
| *No description.* |
| Provisioners
| *[]interface{}
| *No description.* |
| Name
| *string
| The name of the client. |
-| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_client_creds#id DataVaultIdentityOidcClientCreds#id}. |
+| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_client_creds#id DataVaultIdentityOidcClientCreds#id}. |
| Namespace
| *string
| Target namespace. (requires Enterprise). |
---
@@ -758,7 +758,7 @@ Name *string
The name of the client.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_client_creds#name DataVaultIdentityOidcClientCreds#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_client_creds#name DataVaultIdentityOidcClientCreds#name}
---
@@ -770,7 +770,7 @@ Id *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_client_creds#id DataVaultIdentityOidcClientCreds#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_client_creds#id DataVaultIdentityOidcClientCreds#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -787,7 +787,7 @@ Namespace *string
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_client_creds#namespace DataVaultIdentityOidcClientCreds#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_client_creds#namespace DataVaultIdentityOidcClientCreds#namespace}
---
diff --git a/docs/dataVaultIdentityOidcClientCreds.java.md b/docs/dataVaultIdentityOidcClientCreds.java.md
index ec02eb1d..aee03dae 100644
--- a/docs/dataVaultIdentityOidcClientCreds.java.md
+++ b/docs/dataVaultIdentityOidcClientCreds.java.md
@@ -4,7 +4,7 @@
### DataVaultIdentityOidcClientCreds
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_client_creds vault_identity_oidc_client_creds}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_client_creds vault_identity_oidc_client_creds}.
#### Initializers
@@ -41,7 +41,7 @@ DataVaultIdentityOidcClientCreds.Builder.create(Construct scope, java.lang.Strin
| provider
| com.hashicorp.cdktf.TerraformProvider
| *No description.* |
| provisioners
| java.util.List
| *No description.* |
| name
| java.lang.String
| The name of the client. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_client_creds#id DataVaultIdentityOidcClientCreds#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_client_creds#id DataVaultIdentityOidcClientCreds#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
---
@@ -112,7 +112,7 @@ Must be unique amongst siblings in the same scope
The name of the client.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_client_creds#name DataVaultIdentityOidcClientCreds#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_client_creds#name DataVaultIdentityOidcClientCreds#name}
---
@@ -120,7 +120,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_client_creds#id DataVaultIdentityOidcClientCreds#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_client_creds#id DataVaultIdentityOidcClientCreds#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -133,7 +133,7 @@ If you experience problems setting this value it might not be settable. Please t
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_client_creds#namespace DataVaultIdentityOidcClientCreds#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_client_creds#namespace DataVaultIdentityOidcClientCreds#namespace}
---
@@ -470,7 +470,7 @@ The construct id used in the generated config for the DataVaultIdentityOidcClien
The id of the existing DataVaultIdentityOidcClientCreds that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_client_creds#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_client_creds#import import section} in the documentation of this resource for the id to use
---
@@ -768,7 +768,7 @@ DataVaultIdentityOidcClientCredsConfig.builder()
| provider
| com.hashicorp.cdktf.TerraformProvider
| *No description.* |
| provisioners
| java.util.List
| *No description.* |
| name
| java.lang.String
| The name of the client. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_client_creds#id DataVaultIdentityOidcClientCreds#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_client_creds#id DataVaultIdentityOidcClientCreds#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
---
@@ -853,7 +853,7 @@ public java.lang.String getName();
The name of the client.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_client_creds#name DataVaultIdentityOidcClientCreds#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_client_creds#name DataVaultIdentityOidcClientCreds#name}
---
@@ -865,7 +865,7 @@ public java.lang.String getId();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_client_creds#id DataVaultIdentityOidcClientCreds#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_client_creds#id DataVaultIdentityOidcClientCreds#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -882,7 +882,7 @@ public java.lang.String getNamespace();
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_client_creds#namespace DataVaultIdentityOidcClientCreds#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_client_creds#namespace DataVaultIdentityOidcClientCreds#namespace}
---
diff --git a/docs/dataVaultIdentityOidcClientCreds.python.md b/docs/dataVaultIdentityOidcClientCreds.python.md
index f89e494b..9df18c6b 100644
--- a/docs/dataVaultIdentityOidcClientCreds.python.md
+++ b/docs/dataVaultIdentityOidcClientCreds.python.md
@@ -4,7 +4,7 @@
### DataVaultIdentityOidcClientCreds
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_client_creds vault_identity_oidc_client_creds}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_client_creds vault_identity_oidc_client_creds}.
#### Initializers
@@ -39,7 +39,7 @@ dataVaultIdentityOidcClientCreds.DataVaultIdentityOidcClientCreds(
| provider
| cdktf.TerraformProvider
| *No description.* |
| provisioners
| typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]]
| *No description.* |
| name
| str
| The name of the client. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_client_creds#id DataVaultIdentityOidcClientCreds#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_client_creds#id DataVaultIdentityOidcClientCreds#id}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
---
@@ -110,7 +110,7 @@ Must be unique amongst siblings in the same scope
The name of the client.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_client_creds#name DataVaultIdentityOidcClientCreds#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_client_creds#name DataVaultIdentityOidcClientCreds#name}
---
@@ -118,7 +118,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_client_creds#id DataVaultIdentityOidcClientCreds#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_client_creds#id DataVaultIdentityOidcClientCreds#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -131,7 +131,7 @@ If you experience problems setting this value it might not be settable. Please t
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_client_creds#namespace DataVaultIdentityOidcClientCreds#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_client_creds#namespace DataVaultIdentityOidcClientCreds#namespace}
---
@@ -504,7 +504,7 @@ The construct id used in the generated config for the DataVaultIdentityOidcClien
The id of the existing DataVaultIdentityOidcClientCreds that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_client_creds#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_client_creds#import import section} in the documentation of this resource for the id to use
---
@@ -798,7 +798,7 @@ dataVaultIdentityOidcClientCreds.DataVaultIdentityOidcClientCredsConfig(
| provider
| cdktf.TerraformProvider
| *No description.* |
| provisioners
| typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]]
| *No description.* |
| name
| str
| The name of the client. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_client_creds#id DataVaultIdentityOidcClientCreds#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_client_creds#id DataVaultIdentityOidcClientCreds#id}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
---
@@ -883,7 +883,7 @@ name: str
The name of the client.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_client_creds#name DataVaultIdentityOidcClientCreds#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_client_creds#name DataVaultIdentityOidcClientCreds#name}
---
@@ -895,7 +895,7 @@ id: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_client_creds#id DataVaultIdentityOidcClientCreds#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_client_creds#id DataVaultIdentityOidcClientCreds#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -912,7 +912,7 @@ namespace: str
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_client_creds#namespace DataVaultIdentityOidcClientCreds#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_client_creds#namespace DataVaultIdentityOidcClientCreds#namespace}
---
diff --git a/docs/dataVaultIdentityOidcClientCreds.typescript.md b/docs/dataVaultIdentityOidcClientCreds.typescript.md
index b9ccd716..87c989ad 100644
--- a/docs/dataVaultIdentityOidcClientCreds.typescript.md
+++ b/docs/dataVaultIdentityOidcClientCreds.typescript.md
@@ -4,7 +4,7 @@
### DataVaultIdentityOidcClientCreds
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_client_creds vault_identity_oidc_client_creds}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_client_creds vault_identity_oidc_client_creds}.
#### Initializers
@@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultIdentityOidcClien
The id of the existing DataVaultIdentityOidcClientCreds that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_client_creds#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_client_creds#import import section} in the documentation of this resource for the id to use
---
@@ -662,7 +662,7 @@ const dataVaultIdentityOidcClientCredsConfig: dataVaultIdentityOidcClientCreds.D
| provider
| cdktf.TerraformProvider
| *No description.* |
| provisioners
| cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[]
| *No description.* |
| name
| string
| The name of the client. |
-| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_client_creds#id DataVaultIdentityOidcClientCreds#id}. |
+| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_client_creds#id DataVaultIdentityOidcClientCreds#id}. |
| namespace
| string
| Target namespace. (requires Enterprise). |
---
@@ -747,7 +747,7 @@ public readonly name: string;
The name of the client.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_client_creds#name DataVaultIdentityOidcClientCreds#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_client_creds#name DataVaultIdentityOidcClientCreds#name}
---
@@ -759,7 +759,7 @@ public readonly id: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_client_creds#id DataVaultIdentityOidcClientCreds#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_client_creds#id DataVaultIdentityOidcClientCreds#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -776,7 +776,7 @@ public readonly namespace: string;
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_client_creds#namespace DataVaultIdentityOidcClientCreds#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_client_creds#namespace DataVaultIdentityOidcClientCreds#namespace}
---
diff --git a/docs/dataVaultIdentityOidcOpenidConfig.csharp.md b/docs/dataVaultIdentityOidcOpenidConfig.csharp.md
index 6ee5a2f0..796846fd 100644
--- a/docs/dataVaultIdentityOidcOpenidConfig.csharp.md
+++ b/docs/dataVaultIdentityOidcOpenidConfig.csharp.md
@@ -4,7 +4,7 @@
### DataVaultIdentityOidcOpenidConfig
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_openid_config vault_identity_oidc_openid_config}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_openid_config vault_identity_oidc_openid_config}.
#### Initializers
@@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultIdentityOidcOpeni
The id of the existing DataVaultIdentityOidcOpenidConfig that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_openid_config#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_openid_config#import import section} in the documentation of this resource for the id to use
---
@@ -783,7 +783,7 @@ new DataVaultIdentityOidcOpenidConfigConfig {
| Provider
| HashiCorp.Cdktf.TerraformProvider
| *No description.* |
| Provisioners
| object[]
| *No description.* |
| Name
| string
| The name of the provider. |
-| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_openid_config#id DataVaultIdentityOidcOpenidConfig#id}. |
+| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_openid_config#id DataVaultIdentityOidcOpenidConfig#id}. |
| Namespace
| string
| Target namespace. (requires Enterprise). |
---
@@ -868,7 +868,7 @@ public string Name { get; set; }
The name of the provider.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_openid_config#name DataVaultIdentityOidcOpenidConfig#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_openid_config#name DataVaultIdentityOidcOpenidConfig#name}
---
@@ -880,7 +880,7 @@ public string Id { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_openid_config#id DataVaultIdentityOidcOpenidConfig#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_openid_config#id DataVaultIdentityOidcOpenidConfig#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -897,7 +897,7 @@ public string Namespace { get; set; }
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_openid_config#namespace DataVaultIdentityOidcOpenidConfig#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_openid_config#namespace DataVaultIdentityOidcOpenidConfig#namespace}
---
diff --git a/docs/dataVaultIdentityOidcOpenidConfig.go.md b/docs/dataVaultIdentityOidcOpenidConfig.go.md
index b6a79b8c..280e4056 100644
--- a/docs/dataVaultIdentityOidcOpenidConfig.go.md
+++ b/docs/dataVaultIdentityOidcOpenidConfig.go.md
@@ -4,7 +4,7 @@
### DataVaultIdentityOidcOpenidConfig
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_openid_config vault_identity_oidc_openid_config}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_openid_config vault_identity_oidc_openid_config}.
#### Initializers
@@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultIdentityOidcOpeni
The id of the existing DataVaultIdentityOidcOpenidConfig that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_openid_config#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_openid_config#import import section} in the documentation of this resource for the id to use
---
@@ -783,7 +783,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultidentityoidc
| Provider
| github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProvider
| *No description.* |
| Provisioners
| *[]interface{}
| *No description.* |
| Name
| *string
| The name of the provider. |
-| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_openid_config#id DataVaultIdentityOidcOpenidConfig#id}. |
+| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_openid_config#id DataVaultIdentityOidcOpenidConfig#id}. |
| Namespace
| *string
| Target namespace. (requires Enterprise). |
---
@@ -868,7 +868,7 @@ Name *string
The name of the provider.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_openid_config#name DataVaultIdentityOidcOpenidConfig#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_openid_config#name DataVaultIdentityOidcOpenidConfig#name}
---
@@ -880,7 +880,7 @@ Id *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_openid_config#id DataVaultIdentityOidcOpenidConfig#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_openid_config#id DataVaultIdentityOidcOpenidConfig#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -897,7 +897,7 @@ Namespace *string
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_openid_config#namespace DataVaultIdentityOidcOpenidConfig#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_openid_config#namespace DataVaultIdentityOidcOpenidConfig#namespace}
---
diff --git a/docs/dataVaultIdentityOidcOpenidConfig.java.md b/docs/dataVaultIdentityOidcOpenidConfig.java.md
index 7ec63577..6f92b696 100644
--- a/docs/dataVaultIdentityOidcOpenidConfig.java.md
+++ b/docs/dataVaultIdentityOidcOpenidConfig.java.md
@@ -4,7 +4,7 @@
### DataVaultIdentityOidcOpenidConfig
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_openid_config vault_identity_oidc_openid_config}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_openid_config vault_identity_oidc_openid_config}.
#### Initializers
@@ -41,7 +41,7 @@ DataVaultIdentityOidcOpenidConfig.Builder.create(Construct scope, java.lang.Stri
| provider
| com.hashicorp.cdktf.TerraformProvider
| *No description.* |
| provisioners
| java.util.List
| *No description.* |
| name
| java.lang.String
| The name of the provider. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_openid_config#id DataVaultIdentityOidcOpenidConfig#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_openid_config#id DataVaultIdentityOidcOpenidConfig#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
---
@@ -112,7 +112,7 @@ Must be unique amongst siblings in the same scope
The name of the provider.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_openid_config#name DataVaultIdentityOidcOpenidConfig#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_openid_config#name DataVaultIdentityOidcOpenidConfig#name}
---
@@ -120,7 +120,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_openid_config#id DataVaultIdentityOidcOpenidConfig#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_openid_config#id DataVaultIdentityOidcOpenidConfig#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -133,7 +133,7 @@ If you experience problems setting this value it might not be settable. Please t
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_openid_config#namespace DataVaultIdentityOidcOpenidConfig#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_openid_config#namespace DataVaultIdentityOidcOpenidConfig#namespace}
---
@@ -470,7 +470,7 @@ The construct id used in the generated config for the DataVaultIdentityOidcOpeni
The id of the existing DataVaultIdentityOidcOpenidConfig that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_openid_config#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_openid_config#import import section} in the documentation of this resource for the id to use
---
@@ -878,7 +878,7 @@ DataVaultIdentityOidcOpenidConfigConfig.builder()
| provider
| com.hashicorp.cdktf.TerraformProvider
| *No description.* |
| provisioners
| java.util.List
| *No description.* |
| name
| java.lang.String
| The name of the provider. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_openid_config#id DataVaultIdentityOidcOpenidConfig#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_openid_config#id DataVaultIdentityOidcOpenidConfig#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
---
@@ -963,7 +963,7 @@ public java.lang.String getName();
The name of the provider.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_openid_config#name DataVaultIdentityOidcOpenidConfig#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_openid_config#name DataVaultIdentityOidcOpenidConfig#name}
---
@@ -975,7 +975,7 @@ public java.lang.String getId();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_openid_config#id DataVaultIdentityOidcOpenidConfig#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_openid_config#id DataVaultIdentityOidcOpenidConfig#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -992,7 +992,7 @@ public java.lang.String getNamespace();
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_openid_config#namespace DataVaultIdentityOidcOpenidConfig#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_openid_config#namespace DataVaultIdentityOidcOpenidConfig#namespace}
---
diff --git a/docs/dataVaultIdentityOidcOpenidConfig.python.md b/docs/dataVaultIdentityOidcOpenidConfig.python.md
index a885af05..ea553ef4 100644
--- a/docs/dataVaultIdentityOidcOpenidConfig.python.md
+++ b/docs/dataVaultIdentityOidcOpenidConfig.python.md
@@ -4,7 +4,7 @@
### DataVaultIdentityOidcOpenidConfig
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_openid_config vault_identity_oidc_openid_config}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_openid_config vault_identity_oidc_openid_config}.
#### Initializers
@@ -39,7 +39,7 @@ dataVaultIdentityOidcOpenidConfig.DataVaultIdentityOidcOpenidConfig(
| provider
| cdktf.TerraformProvider
| *No description.* |
| provisioners
| typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]]
| *No description.* |
| name
| str
| The name of the provider. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_openid_config#id DataVaultIdentityOidcOpenidConfig#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_openid_config#id DataVaultIdentityOidcOpenidConfig#id}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
---
@@ -110,7 +110,7 @@ Must be unique amongst siblings in the same scope
The name of the provider.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_openid_config#name DataVaultIdentityOidcOpenidConfig#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_openid_config#name DataVaultIdentityOidcOpenidConfig#name}
---
@@ -118,7 +118,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_openid_config#id DataVaultIdentityOidcOpenidConfig#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_openid_config#id DataVaultIdentityOidcOpenidConfig#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -131,7 +131,7 @@ If you experience problems setting this value it might not be settable. Please t
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_openid_config#namespace DataVaultIdentityOidcOpenidConfig#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_openid_config#namespace DataVaultIdentityOidcOpenidConfig#namespace}
---
@@ -504,7 +504,7 @@ The construct id used in the generated config for the DataVaultIdentityOidcOpeni
The id of the existing DataVaultIdentityOidcOpenidConfig that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_openid_config#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_openid_config#import import section} in the documentation of this resource for the id to use
---
@@ -908,7 +908,7 @@ dataVaultIdentityOidcOpenidConfig.DataVaultIdentityOidcOpenidConfigConfig(
| provider
| cdktf.TerraformProvider
| *No description.* |
| provisioners
| typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]]
| *No description.* |
| name
| str
| The name of the provider. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_openid_config#id DataVaultIdentityOidcOpenidConfig#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_openid_config#id DataVaultIdentityOidcOpenidConfig#id}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
---
@@ -993,7 +993,7 @@ name: str
The name of the provider.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_openid_config#name DataVaultIdentityOidcOpenidConfig#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_openid_config#name DataVaultIdentityOidcOpenidConfig#name}
---
@@ -1005,7 +1005,7 @@ id: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_openid_config#id DataVaultIdentityOidcOpenidConfig#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_openid_config#id DataVaultIdentityOidcOpenidConfig#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1022,7 +1022,7 @@ namespace: str
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_openid_config#namespace DataVaultIdentityOidcOpenidConfig#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_openid_config#namespace DataVaultIdentityOidcOpenidConfig#namespace}
---
diff --git a/docs/dataVaultIdentityOidcOpenidConfig.typescript.md b/docs/dataVaultIdentityOidcOpenidConfig.typescript.md
index d5547b02..d7062843 100644
--- a/docs/dataVaultIdentityOidcOpenidConfig.typescript.md
+++ b/docs/dataVaultIdentityOidcOpenidConfig.typescript.md
@@ -4,7 +4,7 @@
### DataVaultIdentityOidcOpenidConfig
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_openid_config vault_identity_oidc_openid_config}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_openid_config vault_identity_oidc_openid_config}.
#### Initializers
@@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultIdentityOidcOpeni
The id of the existing DataVaultIdentityOidcOpenidConfig that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_openid_config#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_openid_config#import import section} in the documentation of this resource for the id to use
---
@@ -772,7 +772,7 @@ const dataVaultIdentityOidcOpenidConfigConfig: dataVaultIdentityOidcOpenidConfig
| provider
| cdktf.TerraformProvider
| *No description.* |
| provisioners
| cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[]
| *No description.* |
| name
| string
| The name of the provider. |
-| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_openid_config#id DataVaultIdentityOidcOpenidConfig#id}. |
+| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_openid_config#id DataVaultIdentityOidcOpenidConfig#id}. |
| namespace
| string
| Target namespace. (requires Enterprise). |
---
@@ -857,7 +857,7 @@ public readonly name: string;
The name of the provider.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_openid_config#name DataVaultIdentityOidcOpenidConfig#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_openid_config#name DataVaultIdentityOidcOpenidConfig#name}
---
@@ -869,7 +869,7 @@ public readonly id: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_openid_config#id DataVaultIdentityOidcOpenidConfig#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_openid_config#id DataVaultIdentityOidcOpenidConfig#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -886,7 +886,7 @@ public readonly namespace: string;
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_openid_config#namespace DataVaultIdentityOidcOpenidConfig#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_openid_config#namespace DataVaultIdentityOidcOpenidConfig#namespace}
---
diff --git a/docs/dataVaultIdentityOidcPublicKeys.csharp.md b/docs/dataVaultIdentityOidcPublicKeys.csharp.md
index 81510a85..7687273f 100644
--- a/docs/dataVaultIdentityOidcPublicKeys.csharp.md
+++ b/docs/dataVaultIdentityOidcPublicKeys.csharp.md
@@ -4,7 +4,7 @@
### DataVaultIdentityOidcPublicKeys
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_public_keys vault_identity_oidc_public_keys}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_public_keys vault_identity_oidc_public_keys}.
#### Initializers
@@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultIdentityOidcPubli
The id of the existing DataVaultIdentityOidcPublicKeys that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_public_keys#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_public_keys#import import section} in the documentation of this resource for the id to use
---
@@ -662,7 +662,7 @@ new DataVaultIdentityOidcPublicKeysConfig {
| Provider
| HashiCorp.Cdktf.TerraformProvider
| *No description.* |
| Provisioners
| object[]
| *No description.* |
| Name
| string
| The name of the provider. |
-| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_public_keys#id DataVaultIdentityOidcPublicKeys#id}. |
+| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_public_keys#id DataVaultIdentityOidcPublicKeys#id}. |
| Namespace
| string
| Target namespace. (requires Enterprise). |
---
@@ -747,7 +747,7 @@ public string Name { get; set; }
The name of the provider.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_public_keys#name DataVaultIdentityOidcPublicKeys#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_public_keys#name DataVaultIdentityOidcPublicKeys#name}
---
@@ -759,7 +759,7 @@ public string Id { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_public_keys#id DataVaultIdentityOidcPublicKeys#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_public_keys#id DataVaultIdentityOidcPublicKeys#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -776,7 +776,7 @@ public string Namespace { get; set; }
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_public_keys#namespace DataVaultIdentityOidcPublicKeys#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_public_keys#namespace DataVaultIdentityOidcPublicKeys#namespace}
---
diff --git a/docs/dataVaultIdentityOidcPublicKeys.go.md b/docs/dataVaultIdentityOidcPublicKeys.go.md
index af22f60c..09d89642 100644
--- a/docs/dataVaultIdentityOidcPublicKeys.go.md
+++ b/docs/dataVaultIdentityOidcPublicKeys.go.md
@@ -4,7 +4,7 @@
### DataVaultIdentityOidcPublicKeys
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_public_keys vault_identity_oidc_public_keys}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_public_keys vault_identity_oidc_public_keys}.
#### Initializers
@@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultIdentityOidcPubli
The id of the existing DataVaultIdentityOidcPublicKeys that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_public_keys#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_public_keys#import import section} in the documentation of this resource for the id to use
---
@@ -662,7 +662,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultidentityoidc
| Provider
| github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProvider
| *No description.* |
| Provisioners
| *[]interface{}
| *No description.* |
| Name
| *string
| The name of the provider. |
-| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_public_keys#id DataVaultIdentityOidcPublicKeys#id}. |
+| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_public_keys#id DataVaultIdentityOidcPublicKeys#id}. |
| Namespace
| *string
| Target namespace. (requires Enterprise). |
---
@@ -747,7 +747,7 @@ Name *string
The name of the provider.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_public_keys#name DataVaultIdentityOidcPublicKeys#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_public_keys#name DataVaultIdentityOidcPublicKeys#name}
---
@@ -759,7 +759,7 @@ Id *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_public_keys#id DataVaultIdentityOidcPublicKeys#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_public_keys#id DataVaultIdentityOidcPublicKeys#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -776,7 +776,7 @@ Namespace *string
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_public_keys#namespace DataVaultIdentityOidcPublicKeys#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_public_keys#namespace DataVaultIdentityOidcPublicKeys#namespace}
---
diff --git a/docs/dataVaultIdentityOidcPublicKeys.java.md b/docs/dataVaultIdentityOidcPublicKeys.java.md
index 71d15554..3b20df9a 100644
--- a/docs/dataVaultIdentityOidcPublicKeys.java.md
+++ b/docs/dataVaultIdentityOidcPublicKeys.java.md
@@ -4,7 +4,7 @@
### DataVaultIdentityOidcPublicKeys
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_public_keys vault_identity_oidc_public_keys}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_public_keys vault_identity_oidc_public_keys}.
#### Initializers
@@ -41,7 +41,7 @@ DataVaultIdentityOidcPublicKeys.Builder.create(Construct scope, java.lang.String
| provider
| com.hashicorp.cdktf.TerraformProvider
| *No description.* |
| provisioners
| java.util.List
| *No description.* |
| name
| java.lang.String
| The name of the provider. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_public_keys#id DataVaultIdentityOidcPublicKeys#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_public_keys#id DataVaultIdentityOidcPublicKeys#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
---
@@ -112,7 +112,7 @@ Must be unique amongst siblings in the same scope
The name of the provider.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_public_keys#name DataVaultIdentityOidcPublicKeys#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_public_keys#name DataVaultIdentityOidcPublicKeys#name}
---
@@ -120,7 +120,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_public_keys#id DataVaultIdentityOidcPublicKeys#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_public_keys#id DataVaultIdentityOidcPublicKeys#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -133,7 +133,7 @@ If you experience problems setting this value it might not be settable. Please t
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_public_keys#namespace DataVaultIdentityOidcPublicKeys#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_public_keys#namespace DataVaultIdentityOidcPublicKeys#namespace}
---
@@ -470,7 +470,7 @@ The construct id used in the generated config for the DataVaultIdentityOidcPubli
The id of the existing DataVaultIdentityOidcPublicKeys that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_public_keys#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_public_keys#import import section} in the documentation of this resource for the id to use
---
@@ -757,7 +757,7 @@ DataVaultIdentityOidcPublicKeysConfig.builder()
| provider
| com.hashicorp.cdktf.TerraformProvider
| *No description.* |
| provisioners
| java.util.List
| *No description.* |
| name
| java.lang.String
| The name of the provider. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_public_keys#id DataVaultIdentityOidcPublicKeys#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_public_keys#id DataVaultIdentityOidcPublicKeys#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
---
@@ -842,7 +842,7 @@ public java.lang.String getName();
The name of the provider.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_public_keys#name DataVaultIdentityOidcPublicKeys#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_public_keys#name DataVaultIdentityOidcPublicKeys#name}
---
@@ -854,7 +854,7 @@ public java.lang.String getId();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_public_keys#id DataVaultIdentityOidcPublicKeys#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_public_keys#id DataVaultIdentityOidcPublicKeys#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -871,7 +871,7 @@ public java.lang.String getNamespace();
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_public_keys#namespace DataVaultIdentityOidcPublicKeys#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_public_keys#namespace DataVaultIdentityOidcPublicKeys#namespace}
---
diff --git a/docs/dataVaultIdentityOidcPublicKeys.python.md b/docs/dataVaultIdentityOidcPublicKeys.python.md
index 5746ecc3..33b0e638 100644
--- a/docs/dataVaultIdentityOidcPublicKeys.python.md
+++ b/docs/dataVaultIdentityOidcPublicKeys.python.md
@@ -4,7 +4,7 @@
### DataVaultIdentityOidcPublicKeys
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_public_keys vault_identity_oidc_public_keys}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_public_keys vault_identity_oidc_public_keys}.
#### Initializers
@@ -39,7 +39,7 @@ dataVaultIdentityOidcPublicKeys.DataVaultIdentityOidcPublicKeys(
| provider
| cdktf.TerraformProvider
| *No description.* |
| provisioners
| typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]]
| *No description.* |
| name
| str
| The name of the provider. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_public_keys#id DataVaultIdentityOidcPublicKeys#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_public_keys#id DataVaultIdentityOidcPublicKeys#id}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
---
@@ -110,7 +110,7 @@ Must be unique amongst siblings in the same scope
The name of the provider.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_public_keys#name DataVaultIdentityOidcPublicKeys#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_public_keys#name DataVaultIdentityOidcPublicKeys#name}
---
@@ -118,7 +118,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_public_keys#id DataVaultIdentityOidcPublicKeys#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_public_keys#id DataVaultIdentityOidcPublicKeys#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -131,7 +131,7 @@ If you experience problems setting this value it might not be settable. Please t
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_public_keys#namespace DataVaultIdentityOidcPublicKeys#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_public_keys#namespace DataVaultIdentityOidcPublicKeys#namespace}
---
@@ -504,7 +504,7 @@ The construct id used in the generated config for the DataVaultIdentityOidcPubli
The id of the existing DataVaultIdentityOidcPublicKeys that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_public_keys#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_public_keys#import import section} in the documentation of this resource for the id to use
---
@@ -787,7 +787,7 @@ dataVaultIdentityOidcPublicKeys.DataVaultIdentityOidcPublicKeysConfig(
| provider
| cdktf.TerraformProvider
| *No description.* |
| provisioners
| typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]]
| *No description.* |
| name
| str
| The name of the provider. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_public_keys#id DataVaultIdentityOidcPublicKeys#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_public_keys#id DataVaultIdentityOidcPublicKeys#id}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
---
@@ -872,7 +872,7 @@ name: str
The name of the provider.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_public_keys#name DataVaultIdentityOidcPublicKeys#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_public_keys#name DataVaultIdentityOidcPublicKeys#name}
---
@@ -884,7 +884,7 @@ id: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_public_keys#id DataVaultIdentityOidcPublicKeys#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_public_keys#id DataVaultIdentityOidcPublicKeys#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -901,7 +901,7 @@ namespace: str
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_public_keys#namespace DataVaultIdentityOidcPublicKeys#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_public_keys#namespace DataVaultIdentityOidcPublicKeys#namespace}
---
diff --git a/docs/dataVaultIdentityOidcPublicKeys.typescript.md b/docs/dataVaultIdentityOidcPublicKeys.typescript.md
index f7a6ad12..7672afc1 100644
--- a/docs/dataVaultIdentityOidcPublicKeys.typescript.md
+++ b/docs/dataVaultIdentityOidcPublicKeys.typescript.md
@@ -4,7 +4,7 @@
### DataVaultIdentityOidcPublicKeys
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_public_keys vault_identity_oidc_public_keys}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_public_keys vault_identity_oidc_public_keys}.
#### Initializers
@@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultIdentityOidcPubli
The id of the existing DataVaultIdentityOidcPublicKeys that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_public_keys#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_public_keys#import import section} in the documentation of this resource for the id to use
---
@@ -651,7 +651,7 @@ const dataVaultIdentityOidcPublicKeysConfig: dataVaultIdentityOidcPublicKeys.Dat
| provider
| cdktf.TerraformProvider
| *No description.* |
| provisioners
| cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[]
| *No description.* |
| name
| string
| The name of the provider. |
-| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_public_keys#id DataVaultIdentityOidcPublicKeys#id}. |
+| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_public_keys#id DataVaultIdentityOidcPublicKeys#id}. |
| namespace
| string
| Target namespace. (requires Enterprise). |
---
@@ -736,7 +736,7 @@ public readonly name: string;
The name of the provider.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_public_keys#name DataVaultIdentityOidcPublicKeys#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_public_keys#name DataVaultIdentityOidcPublicKeys#name}
---
@@ -748,7 +748,7 @@ public readonly id: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_public_keys#id DataVaultIdentityOidcPublicKeys#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_public_keys#id DataVaultIdentityOidcPublicKeys#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -765,7 +765,7 @@ public readonly namespace: string;
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_public_keys#namespace DataVaultIdentityOidcPublicKeys#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_public_keys#namespace DataVaultIdentityOidcPublicKeys#namespace}
---
diff --git a/docs/dataVaultKubernetesAuthBackendConfig.csharp.md b/docs/dataVaultKubernetesAuthBackendConfig.csharp.md
index 5e165faa..1a3d78ad 100644
--- a/docs/dataVaultKubernetesAuthBackendConfig.csharp.md
+++ b/docs/dataVaultKubernetesAuthBackendConfig.csharp.md
@@ -4,7 +4,7 @@
### DataVaultKubernetesAuthBackendConfig
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config vault_kubernetes_auth_backend_config}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config vault_kubernetes_auth_backend_config}.
#### Initializers
@@ -76,6 +76,7 @@ Must be unique amongst siblings in the same scope
| ResetKubernetesHost
| *No description.* |
| ResetNamespace
| *No description.* |
| ResetPemKeys
| *No description.* |
+| ResetUseAnnotationsAsAliasMetadata
| *No description.* |
---
@@ -325,6 +326,12 @@ private void ResetNamespace()
private void ResetPemKeys()
```
+##### `ResetUseAnnotationsAsAliasMetadata`
+
+```csharp
+private void ResetUseAnnotationsAsAliasMetadata()
+```
+
#### Static Functions
| **Name** | **Description** |
@@ -428,7 +435,7 @@ The construct id used in the generated config for the DataVaultKubernetesAuthBac
The id of the existing DataVaultKubernetesAuthBackendConfig that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#import import section} in the documentation of this resource for the id to use
---
@@ -465,6 +472,7 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.
| KubernetesHostInput
| string
| *No description.* |
| NamespaceInput
| string
| *No description.* |
| PemKeysInput
| string[]
| *No description.* |
+| UseAnnotationsAsAliasMetadataInput
| object
| *No description.* |
| Backend
| string
| *No description.* |
| DisableIssValidation
| object
| *No description.* |
| DisableLocalCaJwt
| object
| *No description.* |
@@ -474,6 +482,7 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.
| KubernetesHost
| string
| *No description.* |
| Namespace
| string
| *No description.* |
| PemKeys
| string[]
| *No description.* |
+| UseAnnotationsAsAliasMetadata
| object
| *No description.* |
---
@@ -689,6 +698,16 @@ public string[] PemKeysInput { get; }
---
+##### `UseAnnotationsAsAliasMetadataInput`Optional
+
+```csharp
+public object UseAnnotationsAsAliasMetadataInput { get; }
+```
+
+- *Type:* object
+
+---
+
##### `Backend`Required
```csharp
@@ -779,6 +798,16 @@ public string[] PemKeys { get; }
---
+##### `UseAnnotationsAsAliasMetadata`Required
+
+```csharp
+public object UseAnnotationsAsAliasMetadata { get; }
+```
+
+- *Type:* object
+
+---
+
#### Constants
| **Name** | **Type** | **Description** |
@@ -822,7 +851,8 @@ new DataVaultKubernetesAuthBackendConfigConfig {
string KubernetesCaCert = null,
string KubernetesHost = null,
string Namespace = null,
- string[] PemKeys = null
+ string[] PemKeys = null,
+ object UseAnnotationsAsAliasMetadata = null
};
```
@@ -840,12 +870,13 @@ new DataVaultKubernetesAuthBackendConfigConfig {
| Backend
| string
| Unique name of the kubernetes backend to configure. |
| DisableIssValidation
| object
| Optional disable JWT issuer validation. Allows to skip ISS validation. |
| DisableLocalCaJwt
| object
| Optional disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. |
-| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#id DataVaultKubernetesAuthBackendConfig#id}. |
+| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#id DataVaultKubernetesAuthBackendConfig#id}. |
| Issuer
| string
| Optional JWT issuer. If no issuer is specified, kubernetes.io/serviceaccount will be used as the default issuer. |
| KubernetesCaCert
| string
| PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API. |
| KubernetesHost
| string
| Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server. |
| Namespace
| string
| Target namespace. (requires Enterprise). |
| PemKeys
| string[]
| Optional list of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. |
+| UseAnnotationsAsAliasMetadata
| object
| Use annotations from the client token's associated service account as alias metadata for the Vault entity. |
---
@@ -929,7 +960,7 @@ public string Backend { get; set; }
Unique name of the kubernetes backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#backend DataVaultKubernetesAuthBackendConfig#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#backend DataVaultKubernetesAuthBackendConfig#backend}
---
@@ -943,7 +974,7 @@ public object DisableIssValidation { get; set; }
Optional disable JWT issuer validation. Allows to skip ISS validation.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#disable_iss_validation DataVaultKubernetesAuthBackendConfig#disable_iss_validation}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#disable_iss_validation DataVaultKubernetesAuthBackendConfig#disable_iss_validation}
---
@@ -957,7 +988,7 @@ public object DisableLocalCaJwt { get; set; }
Optional disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#disable_local_ca_jwt DataVaultKubernetesAuthBackendConfig#disable_local_ca_jwt}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#disable_local_ca_jwt DataVaultKubernetesAuthBackendConfig#disable_local_ca_jwt}
---
@@ -969,7 +1000,7 @@ public string Id { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#id DataVaultKubernetesAuthBackendConfig#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#id DataVaultKubernetesAuthBackendConfig#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -986,7 +1017,7 @@ public string Issuer { get; set; }
Optional JWT issuer. If no issuer is specified, kubernetes.io/serviceaccount will be used as the default issuer.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#issuer DataVaultKubernetesAuthBackendConfig#issuer}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#issuer DataVaultKubernetesAuthBackendConfig#issuer}
---
@@ -1000,7 +1031,7 @@ public string KubernetesCaCert { get; set; }
PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#kubernetes_ca_cert DataVaultKubernetesAuthBackendConfig#kubernetes_ca_cert}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#kubernetes_ca_cert DataVaultKubernetesAuthBackendConfig#kubernetes_ca_cert}
---
@@ -1014,7 +1045,7 @@ public string KubernetesHost { get; set; }
Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#kubernetes_host DataVaultKubernetesAuthBackendConfig#kubernetes_host}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#kubernetes_host DataVaultKubernetesAuthBackendConfig#kubernetes_host}
---
@@ -1028,7 +1059,7 @@ public string Namespace { get; set; }
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#namespace DataVaultKubernetesAuthBackendConfig#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#namespace DataVaultKubernetesAuthBackendConfig#namespace}
---
@@ -1044,7 +1075,21 @@ Optional list of PEM-formatted public keys or certificates used to verify the si
If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#pem_keys DataVaultKubernetesAuthBackendConfig#pem_keys}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#pem_keys DataVaultKubernetesAuthBackendConfig#pem_keys}
+
+---
+
+##### `UseAnnotationsAsAliasMetadata`Optional
+
+```csharp
+public object UseAnnotationsAsAliasMetadata { get; set; }
+```
+
+- *Type:* object
+
+Use annotations from the client token's associated service account as alias metadata for the Vault entity.
+
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#use_annotations_as_alias_metadata DataVaultKubernetesAuthBackendConfig#use_annotations_as_alias_metadata}
---
diff --git a/docs/dataVaultKubernetesAuthBackendConfig.go.md b/docs/dataVaultKubernetesAuthBackendConfig.go.md
index f5ba596d..fac17870 100644
--- a/docs/dataVaultKubernetesAuthBackendConfig.go.md
+++ b/docs/dataVaultKubernetesAuthBackendConfig.go.md
@@ -4,7 +4,7 @@
### DataVaultKubernetesAuthBackendConfig
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config vault_kubernetes_auth_backend_config}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config vault_kubernetes_auth_backend_config}.
#### Initializers
@@ -76,6 +76,7 @@ Must be unique amongst siblings in the same scope
| ResetKubernetesHost
| *No description.* |
| ResetNamespace
| *No description.* |
| ResetPemKeys
| *No description.* |
+| ResetUseAnnotationsAsAliasMetadata
| *No description.* |
---
@@ -325,6 +326,12 @@ func ResetNamespace()
func ResetPemKeys()
```
+##### `ResetUseAnnotationsAsAliasMetadata`
+
+```go
+func ResetUseAnnotationsAsAliasMetadata()
+```
+
#### Static Functions
| **Name** | **Description** |
@@ -428,7 +435,7 @@ The construct id used in the generated config for the DataVaultKubernetesAuthBac
The id of the existing DataVaultKubernetesAuthBackendConfig that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#import import section} in the documentation of this resource for the id to use
---
@@ -465,6 +472,7 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.
| KubernetesHostInput
| *string
| *No description.* |
| NamespaceInput
| *string
| *No description.* |
| PemKeysInput
| *[]*string
| *No description.* |
+| UseAnnotationsAsAliasMetadataInput
| interface{}
| *No description.* |
| Backend
| *string
| *No description.* |
| DisableIssValidation
| interface{}
| *No description.* |
| DisableLocalCaJwt
| interface{}
| *No description.* |
@@ -474,6 +482,7 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.
| KubernetesHost
| *string
| *No description.* |
| Namespace
| *string
| *No description.* |
| PemKeys
| *[]*string
| *No description.* |
+| UseAnnotationsAsAliasMetadata
| interface{}
| *No description.* |
---
@@ -689,6 +698,16 @@ func PemKeysInput() *[]*string
---
+##### `UseAnnotationsAsAliasMetadataInput`Optional
+
+```go
+func UseAnnotationsAsAliasMetadataInput() interface{}
+```
+
+- *Type:* interface{}
+
+---
+
##### `Backend`Required
```go
@@ -779,6 +798,16 @@ func PemKeys() *[]*string
---
+##### `UseAnnotationsAsAliasMetadata`Required
+
+```go
+func UseAnnotationsAsAliasMetadata() interface{}
+```
+
+- *Type:* interface{}
+
+---
+
#### Constants
| **Name** | **Type** | **Description** |
@@ -823,6 +852,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultkubernetesau
KubernetesHost: *string,
Namespace: *string,
PemKeys: *[]*string,
+ UseAnnotationsAsAliasMetadata: interface{},
}
```
@@ -840,12 +870,13 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultkubernetesau
| Backend
| *string
| Unique name of the kubernetes backend to configure. |
| DisableIssValidation
| interface{}
| Optional disable JWT issuer validation. Allows to skip ISS validation. |
| DisableLocalCaJwt
| interface{}
| Optional disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. |
-| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#id DataVaultKubernetesAuthBackendConfig#id}. |
+| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#id DataVaultKubernetesAuthBackendConfig#id}. |
| Issuer
| *string
| Optional JWT issuer. If no issuer is specified, kubernetes.io/serviceaccount will be used as the default issuer. |
| KubernetesCaCert
| *string
| PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API. |
| KubernetesHost
| *string
| Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server. |
| Namespace
| *string
| Target namespace. (requires Enterprise). |
| PemKeys
| *[]*string
| Optional list of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. |
+| UseAnnotationsAsAliasMetadata
| interface{}
| Use annotations from the client token's associated service account as alias metadata for the Vault entity. |
---
@@ -929,7 +960,7 @@ Backend *string
Unique name of the kubernetes backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#backend DataVaultKubernetesAuthBackendConfig#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#backend DataVaultKubernetesAuthBackendConfig#backend}
---
@@ -943,7 +974,7 @@ DisableIssValidation interface{}
Optional disable JWT issuer validation. Allows to skip ISS validation.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#disable_iss_validation DataVaultKubernetesAuthBackendConfig#disable_iss_validation}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#disable_iss_validation DataVaultKubernetesAuthBackendConfig#disable_iss_validation}
---
@@ -957,7 +988,7 @@ DisableLocalCaJwt interface{}
Optional disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#disable_local_ca_jwt DataVaultKubernetesAuthBackendConfig#disable_local_ca_jwt}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#disable_local_ca_jwt DataVaultKubernetesAuthBackendConfig#disable_local_ca_jwt}
---
@@ -969,7 +1000,7 @@ Id *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#id DataVaultKubernetesAuthBackendConfig#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#id DataVaultKubernetesAuthBackendConfig#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -986,7 +1017,7 @@ Issuer *string
Optional JWT issuer. If no issuer is specified, kubernetes.io/serviceaccount will be used as the default issuer.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#issuer DataVaultKubernetesAuthBackendConfig#issuer}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#issuer DataVaultKubernetesAuthBackendConfig#issuer}
---
@@ -1000,7 +1031,7 @@ KubernetesCaCert *string
PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#kubernetes_ca_cert DataVaultKubernetesAuthBackendConfig#kubernetes_ca_cert}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#kubernetes_ca_cert DataVaultKubernetesAuthBackendConfig#kubernetes_ca_cert}
---
@@ -1014,7 +1045,7 @@ KubernetesHost *string
Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#kubernetes_host DataVaultKubernetesAuthBackendConfig#kubernetes_host}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#kubernetes_host DataVaultKubernetesAuthBackendConfig#kubernetes_host}
---
@@ -1028,7 +1059,7 @@ Namespace *string
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#namespace DataVaultKubernetesAuthBackendConfig#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#namespace DataVaultKubernetesAuthBackendConfig#namespace}
---
@@ -1044,7 +1075,21 @@ Optional list of PEM-formatted public keys or certificates used to verify the si
If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#pem_keys DataVaultKubernetesAuthBackendConfig#pem_keys}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#pem_keys DataVaultKubernetesAuthBackendConfig#pem_keys}
+
+---
+
+##### `UseAnnotationsAsAliasMetadata`Optional
+
+```go
+UseAnnotationsAsAliasMetadata interface{}
+```
+
+- *Type:* interface{}
+
+Use annotations from the client token's associated service account as alias metadata for the Vault entity.
+
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#use_annotations_as_alias_metadata DataVaultKubernetesAuthBackendConfig#use_annotations_as_alias_metadata}
---
diff --git a/docs/dataVaultKubernetesAuthBackendConfig.java.md b/docs/dataVaultKubernetesAuthBackendConfig.java.md
index 65919dbc..fb9a3e05 100644
--- a/docs/dataVaultKubernetesAuthBackendConfig.java.md
+++ b/docs/dataVaultKubernetesAuthBackendConfig.java.md
@@ -4,7 +4,7 @@
### DataVaultKubernetesAuthBackendConfig
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config vault_kubernetes_auth_backend_config}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config vault_kubernetes_auth_backend_config}.
#### Initializers
@@ -34,6 +34,8 @@ DataVaultKubernetesAuthBackendConfig.Builder.create(Construct scope, java.lang.S
// .kubernetesHost(java.lang.String)
// .namespace(java.lang.String)
// .pemKeys(java.util.List)
+// .useAnnotationsAsAliasMetadata(java.lang.Boolean)
+// .useAnnotationsAsAliasMetadata(IResolvable)
.build();
```
@@ -51,12 +53,13 @@ DataVaultKubernetesAuthBackendConfig.Builder.create(Construct scope, java.lang.S
| backend
| java.lang.String
| Unique name of the kubernetes backend to configure. |
| disableIssValidation
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| Optional disable JWT issuer validation. Allows to skip ISS validation. |
| disableLocalCaJwt
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| Optional disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#id DataVaultKubernetesAuthBackendConfig#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#id DataVaultKubernetesAuthBackendConfig#id}. |
| issuer
| java.lang.String
| Optional JWT issuer. If no issuer is specified, kubernetes.io/serviceaccount will be used as the default issuer. |
| kubernetesCaCert
| java.lang.String
| PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API. |
| kubernetesHost
| java.lang.String
| Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
| pemKeys
| java.util.List
| Optional list of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. |
+| useAnnotationsAsAliasMetadata
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| Use annotations from the client token's associated service account as alias metadata for the Vault entity. |
---
@@ -126,7 +129,7 @@ Must be unique amongst siblings in the same scope
Unique name of the kubernetes backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#backend DataVaultKubernetesAuthBackendConfig#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#backend DataVaultKubernetesAuthBackendConfig#backend}
---
@@ -136,7 +139,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Optional disable JWT issuer validation. Allows to skip ISS validation.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#disable_iss_validation DataVaultKubernetesAuthBackendConfig#disable_iss_validation}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#disable_iss_validation DataVaultKubernetesAuthBackendConfig#disable_iss_validation}
---
@@ -146,7 +149,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Optional disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#disable_local_ca_jwt DataVaultKubernetesAuthBackendConfig#disable_local_ca_jwt}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#disable_local_ca_jwt DataVaultKubernetesAuthBackendConfig#disable_local_ca_jwt}
---
@@ -154,7 +157,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#id DataVaultKubernetesAuthBackendConfig#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#id DataVaultKubernetesAuthBackendConfig#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -167,7 +170,7 @@ If you experience problems setting this value it might not be settable. Please t
Optional JWT issuer. If no issuer is specified, kubernetes.io/serviceaccount will be used as the default issuer.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#issuer DataVaultKubernetesAuthBackendConfig#issuer}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#issuer DataVaultKubernetesAuthBackendConfig#issuer}
---
@@ -177,7 +180,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#kubernetes_ca_cert DataVaultKubernetesAuthBackendConfig#kubernetes_ca_cert}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#kubernetes_ca_cert DataVaultKubernetesAuthBackendConfig#kubernetes_ca_cert}
---
@@ -187,7 +190,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#kubernetes_host DataVaultKubernetesAuthBackendConfig#kubernetes_host}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#kubernetes_host DataVaultKubernetesAuthBackendConfig#kubernetes_host}
---
@@ -197,7 +200,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#namespace DataVaultKubernetesAuthBackendConfig#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#namespace DataVaultKubernetesAuthBackendConfig#namespace}
---
@@ -209,7 +212,17 @@ Optional list of PEM-formatted public keys or certificates used to verify the si
If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#pem_keys DataVaultKubernetesAuthBackendConfig#pem_keys}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#pem_keys DataVaultKubernetesAuthBackendConfig#pem_keys}
+
+---
+
+##### `useAnnotationsAsAliasMetadata`Optional
+
+- *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
+
+Use annotations from the client token's associated service account as alias metadata for the Vault entity.
+
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#use_annotations_as_alias_metadata DataVaultKubernetesAuthBackendConfig#use_annotations_as_alias_metadata}
---
@@ -243,6 +256,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
| resetKubernetesHost
| *No description.* |
| resetNamespace
| *No description.* |
| resetPemKeys
| *No description.* |
+| resetUseAnnotationsAsAliasMetadata
| *No description.* |
---
@@ -492,6 +506,12 @@ public void resetNamespace()
public void resetPemKeys()
```
+##### `resetUseAnnotationsAsAliasMetadata`
+
+```java
+public void resetUseAnnotationsAsAliasMetadata()
+```
+
#### Static Functions
| **Name** | **Description** |
@@ -595,7 +615,7 @@ The construct id used in the generated config for the DataVaultKubernetesAuthBac
The id of the existing DataVaultKubernetesAuthBackendConfig that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#import import section} in the documentation of this resource for the id to use
---
@@ -632,6 +652,7 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.
| kubernetesHostInput
| java.lang.String
| *No description.* |
| namespaceInput
| java.lang.String
| *No description.* |
| pemKeysInput
| java.util.List
| *No description.* |
+| useAnnotationsAsAliasMetadataInput
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| *No description.* |
| backend
| java.lang.String
| *No description.* |
| disableIssValidation
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| *No description.* |
| disableLocalCaJwt
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| *No description.* |
@@ -641,6 +662,7 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.
| kubernetesHost
| java.lang.String
| *No description.* |
| namespace
| java.lang.String
| *No description.* |
| pemKeys
| java.util.List
| *No description.* |
+| useAnnotationsAsAliasMetadata
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| *No description.* |
---
@@ -856,6 +878,16 @@ public java.util.List getPemKeysInput();
---
+##### `useAnnotationsAsAliasMetadataInput`Optional
+
+```java
+public java.lang.Object getUseAnnotationsAsAliasMetadataInput();
+```
+
+- *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
+
+---
+
##### `backend`Required
```java
@@ -946,6 +978,16 @@ public java.util.List getPemKeys();
---
+##### `useAnnotationsAsAliasMetadata`Required
+
+```java
+public java.lang.Object getUseAnnotationsAsAliasMetadata();
+```
+
+- *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
+
+---
+
#### Constants
| **Name** | **Type** | **Description** |
@@ -996,6 +1038,8 @@ DataVaultKubernetesAuthBackendConfigConfig.builder()
// .kubernetesHost(java.lang.String)
// .namespace(java.lang.String)
// .pemKeys(java.util.List)
+// .useAnnotationsAsAliasMetadata(java.lang.Boolean)
+// .useAnnotationsAsAliasMetadata(IResolvable)
.build();
```
@@ -1013,12 +1057,13 @@ DataVaultKubernetesAuthBackendConfigConfig.builder()
| backend
| java.lang.String
| Unique name of the kubernetes backend to configure. |
| disableIssValidation
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| Optional disable JWT issuer validation. Allows to skip ISS validation. |
| disableLocalCaJwt
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| Optional disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#id DataVaultKubernetesAuthBackendConfig#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#id DataVaultKubernetesAuthBackendConfig#id}. |
| issuer
| java.lang.String
| Optional JWT issuer. If no issuer is specified, kubernetes.io/serviceaccount will be used as the default issuer. |
| kubernetesCaCert
| java.lang.String
| PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API. |
| kubernetesHost
| java.lang.String
| Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
| pemKeys
| java.util.List
| Optional list of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. |
+| useAnnotationsAsAliasMetadata
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| Use annotations from the client token's associated service account as alias metadata for the Vault entity. |
---
@@ -1102,7 +1147,7 @@ public java.lang.String getBackend();
Unique name of the kubernetes backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#backend DataVaultKubernetesAuthBackendConfig#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#backend DataVaultKubernetesAuthBackendConfig#backend}
---
@@ -1116,7 +1161,7 @@ public java.lang.Object getDisableIssValidation();
Optional disable JWT issuer validation. Allows to skip ISS validation.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#disable_iss_validation DataVaultKubernetesAuthBackendConfig#disable_iss_validation}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#disable_iss_validation DataVaultKubernetesAuthBackendConfig#disable_iss_validation}
---
@@ -1130,7 +1175,7 @@ public java.lang.Object getDisableLocalCaJwt();
Optional disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#disable_local_ca_jwt DataVaultKubernetesAuthBackendConfig#disable_local_ca_jwt}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#disable_local_ca_jwt DataVaultKubernetesAuthBackendConfig#disable_local_ca_jwt}
---
@@ -1142,7 +1187,7 @@ public java.lang.String getId();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#id DataVaultKubernetesAuthBackendConfig#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#id DataVaultKubernetesAuthBackendConfig#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1159,7 +1204,7 @@ public java.lang.String getIssuer();
Optional JWT issuer. If no issuer is specified, kubernetes.io/serviceaccount will be used as the default issuer.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#issuer DataVaultKubernetesAuthBackendConfig#issuer}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#issuer DataVaultKubernetesAuthBackendConfig#issuer}
---
@@ -1173,7 +1218,7 @@ public java.lang.String getKubernetesCaCert();
PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#kubernetes_ca_cert DataVaultKubernetesAuthBackendConfig#kubernetes_ca_cert}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#kubernetes_ca_cert DataVaultKubernetesAuthBackendConfig#kubernetes_ca_cert}
---
@@ -1187,7 +1232,7 @@ public java.lang.String getKubernetesHost();
Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#kubernetes_host DataVaultKubernetesAuthBackendConfig#kubernetes_host}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#kubernetes_host DataVaultKubernetesAuthBackendConfig#kubernetes_host}
---
@@ -1201,7 +1246,7 @@ public java.lang.String getNamespace();
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#namespace DataVaultKubernetesAuthBackendConfig#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#namespace DataVaultKubernetesAuthBackendConfig#namespace}
---
@@ -1217,7 +1262,21 @@ Optional list of PEM-formatted public keys or certificates used to verify the si
If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#pem_keys DataVaultKubernetesAuthBackendConfig#pem_keys}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#pem_keys DataVaultKubernetesAuthBackendConfig#pem_keys}
+
+---
+
+##### `useAnnotationsAsAliasMetadata`Optional
+
+```java
+public java.lang.Object getUseAnnotationsAsAliasMetadata();
+```
+
+- *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
+
+Use annotations from the client token's associated service account as alias metadata for the Vault entity.
+
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#use_annotations_as_alias_metadata DataVaultKubernetesAuthBackendConfig#use_annotations_as_alias_metadata}
---
diff --git a/docs/dataVaultKubernetesAuthBackendConfig.python.md b/docs/dataVaultKubernetesAuthBackendConfig.python.md
index 499e9fa1..e978594f 100644
--- a/docs/dataVaultKubernetesAuthBackendConfig.python.md
+++ b/docs/dataVaultKubernetesAuthBackendConfig.python.md
@@ -4,7 +4,7 @@
### DataVaultKubernetesAuthBackendConfig
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config vault_kubernetes_auth_backend_config}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config vault_kubernetes_auth_backend_config}.
#### Initializers
@@ -29,7 +29,8 @@ dataVaultKubernetesAuthBackendConfig.DataVaultKubernetesAuthBackendConfig(
kubernetes_ca_cert: str = None,
kubernetes_host: str = None,
namespace: str = None,
- pem_keys: typing.List[str] = None
+ pem_keys: typing.List[str] = None,
+ use_annotations_as_alias_metadata: typing.Union[bool, IResolvable] = None
)
```
@@ -47,12 +48,13 @@ dataVaultKubernetesAuthBackendConfig.DataVaultKubernetesAuthBackendConfig(
| backend
| str
| Unique name of the kubernetes backend to configure. |
| disable_iss_validation
| typing.Union[bool, cdktf.IResolvable]
| Optional disable JWT issuer validation. Allows to skip ISS validation. |
| disable_local_ca_jwt
| typing.Union[bool, cdktf.IResolvable]
| Optional disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#id DataVaultKubernetesAuthBackendConfig#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#id DataVaultKubernetesAuthBackendConfig#id}. |
| issuer
| str
| Optional JWT issuer. If no issuer is specified, kubernetes.io/serviceaccount will be used as the default issuer. |
| kubernetes_ca_cert
| str
| PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API. |
| kubernetes_host
| str
| Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server. |
| namespace
| str
| Target namespace. (requires Enterprise). |
| pem_keys
| typing.List[str]
| Optional list of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. |
+| use_annotations_as_alias_metadata
| typing.Union[bool, cdktf.IResolvable]
| Use annotations from the client token's associated service account as alias metadata for the Vault entity. |
---
@@ -122,7 +124,7 @@ Must be unique amongst siblings in the same scope
Unique name of the kubernetes backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#backend DataVaultKubernetesAuthBackendConfig#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#backend DataVaultKubernetesAuthBackendConfig#backend}
---
@@ -132,7 +134,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Optional disable JWT issuer validation. Allows to skip ISS validation.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#disable_iss_validation DataVaultKubernetesAuthBackendConfig#disable_iss_validation}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#disable_iss_validation DataVaultKubernetesAuthBackendConfig#disable_iss_validation}
---
@@ -142,7 +144,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Optional disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#disable_local_ca_jwt DataVaultKubernetesAuthBackendConfig#disable_local_ca_jwt}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#disable_local_ca_jwt DataVaultKubernetesAuthBackendConfig#disable_local_ca_jwt}
---
@@ -150,7 +152,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#id DataVaultKubernetesAuthBackendConfig#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#id DataVaultKubernetesAuthBackendConfig#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -163,7 +165,7 @@ If you experience problems setting this value it might not be settable. Please t
Optional JWT issuer. If no issuer is specified, kubernetes.io/serviceaccount will be used as the default issuer.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#issuer DataVaultKubernetesAuthBackendConfig#issuer}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#issuer DataVaultKubernetesAuthBackendConfig#issuer}
---
@@ -173,7 +175,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#kubernetes_ca_cert DataVaultKubernetesAuthBackendConfig#kubernetes_ca_cert}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#kubernetes_ca_cert DataVaultKubernetesAuthBackendConfig#kubernetes_ca_cert}
---
@@ -183,7 +185,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#kubernetes_host DataVaultKubernetesAuthBackendConfig#kubernetes_host}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#kubernetes_host DataVaultKubernetesAuthBackendConfig#kubernetes_host}
---
@@ -193,7 +195,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#namespace DataVaultKubernetesAuthBackendConfig#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#namespace DataVaultKubernetesAuthBackendConfig#namespace}
---
@@ -205,7 +207,17 @@ Optional list of PEM-formatted public keys or certificates used to verify the si
If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#pem_keys DataVaultKubernetesAuthBackendConfig#pem_keys}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#pem_keys DataVaultKubernetesAuthBackendConfig#pem_keys}
+
+---
+
+##### `use_annotations_as_alias_metadata`Optional
+
+- *Type:* typing.Union[bool, cdktf.IResolvable]
+
+Use annotations from the client token's associated service account as alias metadata for the Vault entity.
+
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#use_annotations_as_alias_metadata DataVaultKubernetesAuthBackendConfig#use_annotations_as_alias_metadata}
---
@@ -239,6 +251,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
| reset_kubernetes_host
| *No description.* |
| reset_namespace
| *No description.* |
| reset_pem_keys
| *No description.* |
+| reset_use_annotations_as_alias_metadata
| *No description.* |
---
@@ -513,6 +526,12 @@ def reset_namespace() -> None
def reset_pem_keys() -> None
```
+##### `reset_use_annotations_as_alias_metadata`
+
+```python
+def reset_use_annotations_as_alias_metadata() -> None
+```
+
#### Static Functions
| **Name** | **Description** |
@@ -627,7 +646,7 @@ The construct id used in the generated config for the DataVaultKubernetesAuthBac
The id of the existing DataVaultKubernetesAuthBackendConfig that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#import import section} in the documentation of this resource for the id to use
---
@@ -664,6 +683,7 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.
| kubernetes_host_input
| str
| *No description.* |
| namespace_input
| str
| *No description.* |
| pem_keys_input
| typing.List[str]
| *No description.* |
+| use_annotations_as_alias_metadata_input
| typing.Union[bool, cdktf.IResolvable]
| *No description.* |
| backend
| str
| *No description.* |
| disable_iss_validation
| typing.Union[bool, cdktf.IResolvable]
| *No description.* |
| disable_local_ca_jwt
| typing.Union[bool, cdktf.IResolvable]
| *No description.* |
@@ -673,6 +693,7 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.
| kubernetes_host
| str
| *No description.* |
| namespace
| str
| *No description.* |
| pem_keys
| typing.List[str]
| *No description.* |
+| use_annotations_as_alias_metadata
| typing.Union[bool, cdktf.IResolvable]
| *No description.* |
---
@@ -888,6 +909,16 @@ pem_keys_input: typing.List[str]
---
+##### `use_annotations_as_alias_metadata_input`Optional
+
+```python
+use_annotations_as_alias_metadata_input: typing.Union[bool, IResolvable]
+```
+
+- *Type:* typing.Union[bool, cdktf.IResolvable]
+
+---
+
##### `backend`Required
```python
@@ -978,6 +1009,16 @@ pem_keys: typing.List[str]
---
+##### `use_annotations_as_alias_metadata`Required
+
+```python
+use_annotations_as_alias_metadata: typing.Union[bool, IResolvable]
+```
+
+- *Type:* typing.Union[bool, cdktf.IResolvable]
+
+---
+
#### Constants
| **Name** | **Type** | **Description** |
@@ -1021,7 +1062,8 @@ dataVaultKubernetesAuthBackendConfig.DataVaultKubernetesAuthBackendConfigConfig(
kubernetes_ca_cert: str = None,
kubernetes_host: str = None,
namespace: str = None,
- pem_keys: typing.List[str] = None
+ pem_keys: typing.List[str] = None,
+ use_annotations_as_alias_metadata: typing.Union[bool, IResolvable] = None
)
```
@@ -1039,12 +1081,13 @@ dataVaultKubernetesAuthBackendConfig.DataVaultKubernetesAuthBackendConfigConfig(
| backend
| str
| Unique name of the kubernetes backend to configure. |
| disable_iss_validation
| typing.Union[bool, cdktf.IResolvable]
| Optional disable JWT issuer validation. Allows to skip ISS validation. |
| disable_local_ca_jwt
| typing.Union[bool, cdktf.IResolvable]
| Optional disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#id DataVaultKubernetesAuthBackendConfig#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#id DataVaultKubernetesAuthBackendConfig#id}. |
| issuer
| str
| Optional JWT issuer. If no issuer is specified, kubernetes.io/serviceaccount will be used as the default issuer. |
| kubernetes_ca_cert
| str
| PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API. |
| kubernetes_host
| str
| Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server. |
| namespace
| str
| Target namespace. (requires Enterprise). |
| pem_keys
| typing.List[str]
| Optional list of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. |
+| use_annotations_as_alias_metadata
| typing.Union[bool, cdktf.IResolvable]
| Use annotations from the client token's associated service account as alias metadata for the Vault entity. |
---
@@ -1128,7 +1171,7 @@ backend: str
Unique name of the kubernetes backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#backend DataVaultKubernetesAuthBackendConfig#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#backend DataVaultKubernetesAuthBackendConfig#backend}
---
@@ -1142,7 +1185,7 @@ disable_iss_validation: typing.Union[bool, IResolvable]
Optional disable JWT issuer validation. Allows to skip ISS validation.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#disable_iss_validation DataVaultKubernetesAuthBackendConfig#disable_iss_validation}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#disable_iss_validation DataVaultKubernetesAuthBackendConfig#disable_iss_validation}
---
@@ -1156,7 +1199,7 @@ disable_local_ca_jwt: typing.Union[bool, IResolvable]
Optional disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#disable_local_ca_jwt DataVaultKubernetesAuthBackendConfig#disable_local_ca_jwt}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#disable_local_ca_jwt DataVaultKubernetesAuthBackendConfig#disable_local_ca_jwt}
---
@@ -1168,7 +1211,7 @@ id: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#id DataVaultKubernetesAuthBackendConfig#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#id DataVaultKubernetesAuthBackendConfig#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1185,7 +1228,7 @@ issuer: str
Optional JWT issuer. If no issuer is specified, kubernetes.io/serviceaccount will be used as the default issuer.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#issuer DataVaultKubernetesAuthBackendConfig#issuer}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#issuer DataVaultKubernetesAuthBackendConfig#issuer}
---
@@ -1199,7 +1242,7 @@ kubernetes_ca_cert: str
PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#kubernetes_ca_cert DataVaultKubernetesAuthBackendConfig#kubernetes_ca_cert}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#kubernetes_ca_cert DataVaultKubernetesAuthBackendConfig#kubernetes_ca_cert}
---
@@ -1213,7 +1256,7 @@ kubernetes_host: str
Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#kubernetes_host DataVaultKubernetesAuthBackendConfig#kubernetes_host}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#kubernetes_host DataVaultKubernetesAuthBackendConfig#kubernetes_host}
---
@@ -1227,7 +1270,7 @@ namespace: str
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#namespace DataVaultKubernetesAuthBackendConfig#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#namespace DataVaultKubernetesAuthBackendConfig#namespace}
---
@@ -1243,7 +1286,21 @@ Optional list of PEM-formatted public keys or certificates used to verify the si
If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#pem_keys DataVaultKubernetesAuthBackendConfig#pem_keys}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#pem_keys DataVaultKubernetesAuthBackendConfig#pem_keys}
+
+---
+
+##### `use_annotations_as_alias_metadata`Optional
+
+```python
+use_annotations_as_alias_metadata: typing.Union[bool, IResolvable]
+```
+
+- *Type:* typing.Union[bool, cdktf.IResolvable]
+
+Use annotations from the client token's associated service account as alias metadata for the Vault entity.
+
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#use_annotations_as_alias_metadata DataVaultKubernetesAuthBackendConfig#use_annotations_as_alias_metadata}
---
diff --git a/docs/dataVaultKubernetesAuthBackendConfig.typescript.md b/docs/dataVaultKubernetesAuthBackendConfig.typescript.md
index 01af95dd..3bf26796 100644
--- a/docs/dataVaultKubernetesAuthBackendConfig.typescript.md
+++ b/docs/dataVaultKubernetesAuthBackendConfig.typescript.md
@@ -4,7 +4,7 @@
### DataVaultKubernetesAuthBackendConfig
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config vault_kubernetes_auth_backend_config}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config vault_kubernetes_auth_backend_config}.
#### Initializers
@@ -76,6 +76,7 @@ Must be unique amongst siblings in the same scope
| resetKubernetesHost
| *No description.* |
| resetNamespace
| *No description.* |
| resetPemKeys
| *No description.* |
+| resetUseAnnotationsAsAliasMetadata
| *No description.* |
---
@@ -325,6 +326,12 @@ public resetNamespace(): void
public resetPemKeys(): void
```
+##### `resetUseAnnotationsAsAliasMetadata`
+
+```typescript
+public resetUseAnnotationsAsAliasMetadata(): void
+```
+
#### Static Functions
| **Name** | **Description** |
@@ -428,7 +435,7 @@ The construct id used in the generated config for the DataVaultKubernetesAuthBac
The id of the existing DataVaultKubernetesAuthBackendConfig that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#import import section} in the documentation of this resource for the id to use
---
@@ -465,6 +472,7 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.
| kubernetesHostInput
| string
| *No description.* |
| namespaceInput
| string
| *No description.* |
| pemKeysInput
| string[]
| *No description.* |
+| useAnnotationsAsAliasMetadataInput
| boolean \| cdktf.IResolvable
| *No description.* |
| backend
| string
| *No description.* |
| disableIssValidation
| boolean \| cdktf.IResolvable
| *No description.* |
| disableLocalCaJwt
| boolean \| cdktf.IResolvable
| *No description.* |
@@ -474,6 +482,7 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.
| kubernetesHost
| string
| *No description.* |
| namespace
| string
| *No description.* |
| pemKeys
| string[]
| *No description.* |
+| useAnnotationsAsAliasMetadata
| boolean \| cdktf.IResolvable
| *No description.* |
---
@@ -689,6 +698,16 @@ public readonly pemKeysInput: string[];
---
+##### `useAnnotationsAsAliasMetadataInput`Optional
+
+```typescript
+public readonly useAnnotationsAsAliasMetadataInput: boolean | IResolvable;
+```
+
+- *Type:* boolean | cdktf.IResolvable
+
+---
+
##### `backend`Required
```typescript
@@ -779,6 +798,16 @@ public readonly pemKeys: string[];
---
+##### `useAnnotationsAsAliasMetadata`Required
+
+```typescript
+public readonly useAnnotationsAsAliasMetadata: boolean | IResolvable;
+```
+
+- *Type:* boolean | cdktf.IResolvable
+
+---
+
#### Constants
| **Name** | **Type** | **Description** |
@@ -823,12 +852,13 @@ const dataVaultKubernetesAuthBackendConfigConfig: dataVaultKubernetesAuthBackend
| backend
| string
| Unique name of the kubernetes backend to configure. |
| disableIssValidation
| boolean \| cdktf.IResolvable
| Optional disable JWT issuer validation. Allows to skip ISS validation. |
| disableLocalCaJwt
| boolean \| cdktf.IResolvable
| Optional disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. |
-| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#id DataVaultKubernetesAuthBackendConfig#id}. |
+| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#id DataVaultKubernetesAuthBackendConfig#id}. |
| issuer
| string
| Optional JWT issuer. If no issuer is specified, kubernetes.io/serviceaccount will be used as the default issuer. |
| kubernetesCaCert
| string
| PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API. |
| kubernetesHost
| string
| Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server. |
| namespace
| string
| Target namespace. (requires Enterprise). |
| pemKeys
| string[]
| Optional list of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. |
+| useAnnotationsAsAliasMetadata
| boolean \| cdktf.IResolvable
| Use annotations from the client token's associated service account as alias metadata for the Vault entity. |
---
@@ -912,7 +942,7 @@ public readonly backend: string;
Unique name of the kubernetes backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#backend DataVaultKubernetesAuthBackendConfig#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#backend DataVaultKubernetesAuthBackendConfig#backend}
---
@@ -926,7 +956,7 @@ public readonly disableIssValidation: boolean | IResolvable;
Optional disable JWT issuer validation. Allows to skip ISS validation.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#disable_iss_validation DataVaultKubernetesAuthBackendConfig#disable_iss_validation}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#disable_iss_validation DataVaultKubernetesAuthBackendConfig#disable_iss_validation}
---
@@ -940,7 +970,7 @@ public readonly disableLocalCaJwt: boolean | IResolvable;
Optional disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#disable_local_ca_jwt DataVaultKubernetesAuthBackendConfig#disable_local_ca_jwt}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#disable_local_ca_jwt DataVaultKubernetesAuthBackendConfig#disable_local_ca_jwt}
---
@@ -952,7 +982,7 @@ public readonly id: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#id DataVaultKubernetesAuthBackendConfig#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#id DataVaultKubernetesAuthBackendConfig#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -969,7 +999,7 @@ public readonly issuer: string;
Optional JWT issuer. If no issuer is specified, kubernetes.io/serviceaccount will be used as the default issuer.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#issuer DataVaultKubernetesAuthBackendConfig#issuer}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#issuer DataVaultKubernetesAuthBackendConfig#issuer}
---
@@ -983,7 +1013,7 @@ public readonly kubernetesCaCert: string;
PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#kubernetes_ca_cert DataVaultKubernetesAuthBackendConfig#kubernetes_ca_cert}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#kubernetes_ca_cert DataVaultKubernetesAuthBackendConfig#kubernetes_ca_cert}
---
@@ -997,7 +1027,7 @@ public readonly kubernetesHost: string;
Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#kubernetes_host DataVaultKubernetesAuthBackendConfig#kubernetes_host}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#kubernetes_host DataVaultKubernetesAuthBackendConfig#kubernetes_host}
---
@@ -1011,7 +1041,7 @@ public readonly namespace: string;
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#namespace DataVaultKubernetesAuthBackendConfig#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#namespace DataVaultKubernetesAuthBackendConfig#namespace}
---
@@ -1027,7 +1057,21 @@ Optional list of PEM-formatted public keys or certificates used to verify the si
If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#pem_keys DataVaultKubernetesAuthBackendConfig#pem_keys}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#pem_keys DataVaultKubernetesAuthBackendConfig#pem_keys}
+
+---
+
+##### `useAnnotationsAsAliasMetadata`Optional
+
+```typescript
+public readonly useAnnotationsAsAliasMetadata: boolean | IResolvable;
+```
+
+- *Type:* boolean | cdktf.IResolvable
+
+Use annotations from the client token's associated service account as alias metadata for the Vault entity.
+
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#use_annotations_as_alias_metadata DataVaultKubernetesAuthBackendConfig#use_annotations_as_alias_metadata}
---
diff --git a/docs/dataVaultKubernetesAuthBackendRole.csharp.md b/docs/dataVaultKubernetesAuthBackendRole.csharp.md
index cc92c68a..b5b025a2 100644
--- a/docs/dataVaultKubernetesAuthBackendRole.csharp.md
+++ b/docs/dataVaultKubernetesAuthBackendRole.csharp.md
@@ -4,7 +4,7 @@
### DataVaultKubernetesAuthBackendRole
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role vault_kubernetes_auth_backend_role}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role vault_kubernetes_auth_backend_role}.
#### Initializers
@@ -456,7 +456,7 @@ The construct id used in the generated config for the DataVaultKubernetesAuthBac
The id of the existing DataVaultKubernetesAuthBackendRole that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#import import section} in the documentation of this resource for the id to use
---
@@ -1016,7 +1016,7 @@ new DataVaultKubernetesAuthBackendRoleConfig {
| RoleName
| string
| Name of the role. |
| Audience
| string
| Optional Audience claim to verify in the JWT. |
| Backend
| string
| Unique name of the kubernetes backend to configure. |
-| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#id DataVaultKubernetesAuthBackendRole#id}. |
+| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#id DataVaultKubernetesAuthBackendRole#id}. |
| Namespace
| string
| Target namespace. (requires Enterprise). |
| TokenBoundCidrs
| string[]
| Specifies the blocks of IP addresses which are allowed to use the generated token. |
| TokenExplicitMaxTtl
| double
| Generated Token's Explicit Maximum TTL in seconds. |
@@ -1110,7 +1110,7 @@ public string RoleName { get; set; }
Name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#role_name DataVaultKubernetesAuthBackendRole#role_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#role_name DataVaultKubernetesAuthBackendRole#role_name}
---
@@ -1124,7 +1124,7 @@ public string Audience { get; set; }
Optional Audience claim to verify in the JWT.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#audience DataVaultKubernetesAuthBackendRole#audience}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#audience DataVaultKubernetesAuthBackendRole#audience}
---
@@ -1138,7 +1138,7 @@ public string Backend { get; set; }
Unique name of the kubernetes backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#backend DataVaultKubernetesAuthBackendRole#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#backend DataVaultKubernetesAuthBackendRole#backend}
---
@@ -1150,7 +1150,7 @@ public string Id { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#id DataVaultKubernetesAuthBackendRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#id DataVaultKubernetesAuthBackendRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1167,7 +1167,7 @@ public string Namespace { get; set; }
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#namespace DataVaultKubernetesAuthBackendRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#namespace DataVaultKubernetesAuthBackendRole#namespace}
---
@@ -1181,7 +1181,7 @@ public string[] TokenBoundCidrs { get; set; }
Specifies the blocks of IP addresses which are allowed to use the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_bound_cidrs DataVaultKubernetesAuthBackendRole#token_bound_cidrs}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_bound_cidrs DataVaultKubernetesAuthBackendRole#token_bound_cidrs}
---
@@ -1195,7 +1195,7 @@ public double TokenExplicitMaxTtl { get; set; }
Generated Token's Explicit Maximum TTL in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_explicit_max_ttl DataVaultKubernetesAuthBackendRole#token_explicit_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_explicit_max_ttl DataVaultKubernetesAuthBackendRole#token_explicit_max_ttl}
---
@@ -1209,7 +1209,7 @@ public double TokenMaxTtl { get; set; }
The maximum lifetime of the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_max_ttl DataVaultKubernetesAuthBackendRole#token_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_max_ttl DataVaultKubernetesAuthBackendRole#token_max_ttl}
---
@@ -1223,7 +1223,7 @@ public object TokenNoDefaultPolicy { get; set; }
If true, the 'default' policy will not automatically be added to generated tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_no_default_policy DataVaultKubernetesAuthBackendRole#token_no_default_policy}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_no_default_policy DataVaultKubernetesAuthBackendRole#token_no_default_policy}
---
@@ -1237,7 +1237,7 @@ public double TokenNumUses { get; set; }
The maximum number of times a token may be used, a value of zero means unlimited.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_num_uses DataVaultKubernetesAuthBackendRole#token_num_uses}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_num_uses DataVaultKubernetesAuthBackendRole#token_num_uses}
---
@@ -1251,7 +1251,7 @@ public double TokenPeriod { get; set; }
Generated Token's Period.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_period DataVaultKubernetesAuthBackendRole#token_period}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_period DataVaultKubernetesAuthBackendRole#token_period}
---
@@ -1265,7 +1265,7 @@ public string[] TokenPolicies { get; set; }
Generated Token's Policies.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_policies DataVaultKubernetesAuthBackendRole#token_policies}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_policies DataVaultKubernetesAuthBackendRole#token_policies}
---
@@ -1279,7 +1279,7 @@ public double TokenTtl { get; set; }
The initial ttl of the token to generate in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_ttl DataVaultKubernetesAuthBackendRole#token_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_ttl DataVaultKubernetesAuthBackendRole#token_ttl}
---
@@ -1293,7 +1293,7 @@ public string TokenType { get; set; }
The type of token to generate, service or batch.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_type DataVaultKubernetesAuthBackendRole#token_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_type DataVaultKubernetesAuthBackendRole#token_type}
---
diff --git a/docs/dataVaultKubernetesAuthBackendRole.go.md b/docs/dataVaultKubernetesAuthBackendRole.go.md
index 01e5a6f2..04ffedce 100644
--- a/docs/dataVaultKubernetesAuthBackendRole.go.md
+++ b/docs/dataVaultKubernetesAuthBackendRole.go.md
@@ -4,7 +4,7 @@
### DataVaultKubernetesAuthBackendRole
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role vault_kubernetes_auth_backend_role}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role vault_kubernetes_auth_backend_role}.
#### Initializers
@@ -456,7 +456,7 @@ The construct id used in the generated config for the DataVaultKubernetesAuthBac
The id of the existing DataVaultKubernetesAuthBackendRole that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#import import section} in the documentation of this resource for the id to use
---
@@ -1016,7 +1016,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultkubernetesau
| RoleName
| *string
| Name of the role. |
| Audience
| *string
| Optional Audience claim to verify in the JWT. |
| Backend
| *string
| Unique name of the kubernetes backend to configure. |
-| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#id DataVaultKubernetesAuthBackendRole#id}. |
+| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#id DataVaultKubernetesAuthBackendRole#id}. |
| Namespace
| *string
| Target namespace. (requires Enterprise). |
| TokenBoundCidrs
| *[]*string
| Specifies the blocks of IP addresses which are allowed to use the generated token. |
| TokenExplicitMaxTtl
| *f64
| Generated Token's Explicit Maximum TTL in seconds. |
@@ -1110,7 +1110,7 @@ RoleName *string
Name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#role_name DataVaultKubernetesAuthBackendRole#role_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#role_name DataVaultKubernetesAuthBackendRole#role_name}
---
@@ -1124,7 +1124,7 @@ Audience *string
Optional Audience claim to verify in the JWT.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#audience DataVaultKubernetesAuthBackendRole#audience}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#audience DataVaultKubernetesAuthBackendRole#audience}
---
@@ -1138,7 +1138,7 @@ Backend *string
Unique name of the kubernetes backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#backend DataVaultKubernetesAuthBackendRole#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#backend DataVaultKubernetesAuthBackendRole#backend}
---
@@ -1150,7 +1150,7 @@ Id *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#id DataVaultKubernetesAuthBackendRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#id DataVaultKubernetesAuthBackendRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1167,7 +1167,7 @@ Namespace *string
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#namespace DataVaultKubernetesAuthBackendRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#namespace DataVaultKubernetesAuthBackendRole#namespace}
---
@@ -1181,7 +1181,7 @@ TokenBoundCidrs *[]*string
Specifies the blocks of IP addresses which are allowed to use the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_bound_cidrs DataVaultKubernetesAuthBackendRole#token_bound_cidrs}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_bound_cidrs DataVaultKubernetesAuthBackendRole#token_bound_cidrs}
---
@@ -1195,7 +1195,7 @@ TokenExplicitMaxTtl *f64
Generated Token's Explicit Maximum TTL in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_explicit_max_ttl DataVaultKubernetesAuthBackendRole#token_explicit_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_explicit_max_ttl DataVaultKubernetesAuthBackendRole#token_explicit_max_ttl}
---
@@ -1209,7 +1209,7 @@ TokenMaxTtl *f64
The maximum lifetime of the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_max_ttl DataVaultKubernetesAuthBackendRole#token_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_max_ttl DataVaultKubernetesAuthBackendRole#token_max_ttl}
---
@@ -1223,7 +1223,7 @@ TokenNoDefaultPolicy interface{}
If true, the 'default' policy will not automatically be added to generated tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_no_default_policy DataVaultKubernetesAuthBackendRole#token_no_default_policy}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_no_default_policy DataVaultKubernetesAuthBackendRole#token_no_default_policy}
---
@@ -1237,7 +1237,7 @@ TokenNumUses *f64
The maximum number of times a token may be used, a value of zero means unlimited.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_num_uses DataVaultKubernetesAuthBackendRole#token_num_uses}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_num_uses DataVaultKubernetesAuthBackendRole#token_num_uses}
---
@@ -1251,7 +1251,7 @@ TokenPeriod *f64
Generated Token's Period.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_period DataVaultKubernetesAuthBackendRole#token_period}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_period DataVaultKubernetesAuthBackendRole#token_period}
---
@@ -1265,7 +1265,7 @@ TokenPolicies *[]*string
Generated Token's Policies.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_policies DataVaultKubernetesAuthBackendRole#token_policies}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_policies DataVaultKubernetesAuthBackendRole#token_policies}
---
@@ -1279,7 +1279,7 @@ TokenTtl *f64
The initial ttl of the token to generate in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_ttl DataVaultKubernetesAuthBackendRole#token_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_ttl DataVaultKubernetesAuthBackendRole#token_ttl}
---
@@ -1293,7 +1293,7 @@ TokenType *string
The type of token to generate, service or batch.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_type DataVaultKubernetesAuthBackendRole#token_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_type DataVaultKubernetesAuthBackendRole#token_type}
---
diff --git a/docs/dataVaultKubernetesAuthBackendRole.java.md b/docs/dataVaultKubernetesAuthBackendRole.java.md
index 6c9b6d3b..dd9f4774 100644
--- a/docs/dataVaultKubernetesAuthBackendRole.java.md
+++ b/docs/dataVaultKubernetesAuthBackendRole.java.md
@@ -4,7 +4,7 @@
### DataVaultKubernetesAuthBackendRole
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role vault_kubernetes_auth_backend_role}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role vault_kubernetes_auth_backend_role}.
#### Initializers
@@ -55,7 +55,7 @@ DataVaultKubernetesAuthBackendRole.Builder.create(Construct scope, java.lang.Str
| roleName
| java.lang.String
| Name of the role. |
| audience
| java.lang.String
| Optional Audience claim to verify in the JWT. |
| backend
| java.lang.String
| Unique name of the kubernetes backend to configure. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#id DataVaultKubernetesAuthBackendRole#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#id DataVaultKubernetesAuthBackendRole#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
| tokenBoundCidrs
| java.util.List
| Specifies the blocks of IP addresses which are allowed to use the generated token. |
| tokenExplicitMaxTtl
| java.lang.Number
| Generated Token's Explicit Maximum TTL in seconds. |
@@ -135,7 +135,7 @@ Must be unique amongst siblings in the same scope
Name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#role_name DataVaultKubernetesAuthBackendRole#role_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#role_name DataVaultKubernetesAuthBackendRole#role_name}
---
@@ -145,7 +145,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Optional Audience claim to verify in the JWT.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#audience DataVaultKubernetesAuthBackendRole#audience}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#audience DataVaultKubernetesAuthBackendRole#audience}
---
@@ -155,7 +155,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Unique name of the kubernetes backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#backend DataVaultKubernetesAuthBackendRole#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#backend DataVaultKubernetesAuthBackendRole#backend}
---
@@ -163,7 +163,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#id DataVaultKubernetesAuthBackendRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#id DataVaultKubernetesAuthBackendRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -176,7 +176,7 @@ If you experience problems setting this value it might not be settable. Please t
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#namespace DataVaultKubernetesAuthBackendRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#namespace DataVaultKubernetesAuthBackendRole#namespace}
---
@@ -186,7 +186,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Specifies the blocks of IP addresses which are allowed to use the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_bound_cidrs DataVaultKubernetesAuthBackendRole#token_bound_cidrs}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_bound_cidrs DataVaultKubernetesAuthBackendRole#token_bound_cidrs}
---
@@ -196,7 +196,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Generated Token's Explicit Maximum TTL in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_explicit_max_ttl DataVaultKubernetesAuthBackendRole#token_explicit_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_explicit_max_ttl DataVaultKubernetesAuthBackendRole#token_explicit_max_ttl}
---
@@ -206,7 +206,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The maximum lifetime of the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_max_ttl DataVaultKubernetesAuthBackendRole#token_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_max_ttl DataVaultKubernetesAuthBackendRole#token_max_ttl}
---
@@ -216,7 +216,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
If true, the 'default' policy will not automatically be added to generated tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_no_default_policy DataVaultKubernetesAuthBackendRole#token_no_default_policy}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_no_default_policy DataVaultKubernetesAuthBackendRole#token_no_default_policy}
---
@@ -226,7 +226,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The maximum number of times a token may be used, a value of zero means unlimited.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_num_uses DataVaultKubernetesAuthBackendRole#token_num_uses}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_num_uses DataVaultKubernetesAuthBackendRole#token_num_uses}
---
@@ -236,7 +236,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Generated Token's Period.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_period DataVaultKubernetesAuthBackendRole#token_period}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_period DataVaultKubernetesAuthBackendRole#token_period}
---
@@ -246,7 +246,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Generated Token's Policies.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_policies DataVaultKubernetesAuthBackendRole#token_policies}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_policies DataVaultKubernetesAuthBackendRole#token_policies}
---
@@ -256,7 +256,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The initial ttl of the token to generate in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_ttl DataVaultKubernetesAuthBackendRole#token_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_ttl DataVaultKubernetesAuthBackendRole#token_ttl}
---
@@ -266,7 +266,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The type of token to generate, service or batch.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_type DataVaultKubernetesAuthBackendRole#token_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_type DataVaultKubernetesAuthBackendRole#token_type}
---
@@ -680,7 +680,7 @@ The construct id used in the generated config for the DataVaultKubernetesAuthBac
The id of the existing DataVaultKubernetesAuthBackendRole that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#import import section} in the documentation of this resource for the id to use
---
@@ -1245,7 +1245,7 @@ DataVaultKubernetesAuthBackendRoleConfig.builder()
| roleName
| java.lang.String
| Name of the role. |
| audience
| java.lang.String
| Optional Audience claim to verify in the JWT. |
| backend
| java.lang.String
| Unique name of the kubernetes backend to configure. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#id DataVaultKubernetesAuthBackendRole#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#id DataVaultKubernetesAuthBackendRole#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
| tokenBoundCidrs
| java.util.List
| Specifies the blocks of IP addresses which are allowed to use the generated token. |
| tokenExplicitMaxTtl
| java.lang.Number
| Generated Token's Explicit Maximum TTL in seconds. |
@@ -1339,7 +1339,7 @@ public java.lang.String getRoleName();
Name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#role_name DataVaultKubernetesAuthBackendRole#role_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#role_name DataVaultKubernetesAuthBackendRole#role_name}
---
@@ -1353,7 +1353,7 @@ public java.lang.String getAudience();
Optional Audience claim to verify in the JWT.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#audience DataVaultKubernetesAuthBackendRole#audience}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#audience DataVaultKubernetesAuthBackendRole#audience}
---
@@ -1367,7 +1367,7 @@ public java.lang.String getBackend();
Unique name of the kubernetes backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#backend DataVaultKubernetesAuthBackendRole#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#backend DataVaultKubernetesAuthBackendRole#backend}
---
@@ -1379,7 +1379,7 @@ public java.lang.String getId();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#id DataVaultKubernetesAuthBackendRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#id DataVaultKubernetesAuthBackendRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1396,7 +1396,7 @@ public java.lang.String getNamespace();
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#namespace DataVaultKubernetesAuthBackendRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#namespace DataVaultKubernetesAuthBackendRole#namespace}
---
@@ -1410,7 +1410,7 @@ public java.util.List getTokenBoundCidrs();
Specifies the blocks of IP addresses which are allowed to use the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_bound_cidrs DataVaultKubernetesAuthBackendRole#token_bound_cidrs}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_bound_cidrs DataVaultKubernetesAuthBackendRole#token_bound_cidrs}
---
@@ -1424,7 +1424,7 @@ public java.lang.Number getTokenExplicitMaxTtl();
Generated Token's Explicit Maximum TTL in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_explicit_max_ttl DataVaultKubernetesAuthBackendRole#token_explicit_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_explicit_max_ttl DataVaultKubernetesAuthBackendRole#token_explicit_max_ttl}
---
@@ -1438,7 +1438,7 @@ public java.lang.Number getTokenMaxTtl();
The maximum lifetime of the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_max_ttl DataVaultKubernetesAuthBackendRole#token_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_max_ttl DataVaultKubernetesAuthBackendRole#token_max_ttl}
---
@@ -1452,7 +1452,7 @@ public java.lang.Object getTokenNoDefaultPolicy();
If true, the 'default' policy will not automatically be added to generated tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_no_default_policy DataVaultKubernetesAuthBackendRole#token_no_default_policy}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_no_default_policy DataVaultKubernetesAuthBackendRole#token_no_default_policy}
---
@@ -1466,7 +1466,7 @@ public java.lang.Number getTokenNumUses();
The maximum number of times a token may be used, a value of zero means unlimited.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_num_uses DataVaultKubernetesAuthBackendRole#token_num_uses}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_num_uses DataVaultKubernetesAuthBackendRole#token_num_uses}
---
@@ -1480,7 +1480,7 @@ public java.lang.Number getTokenPeriod();
Generated Token's Period.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_period DataVaultKubernetesAuthBackendRole#token_period}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_period DataVaultKubernetesAuthBackendRole#token_period}
---
@@ -1494,7 +1494,7 @@ public java.util.List getTokenPolicies();
Generated Token's Policies.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_policies DataVaultKubernetesAuthBackendRole#token_policies}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_policies DataVaultKubernetesAuthBackendRole#token_policies}
---
@@ -1508,7 +1508,7 @@ public java.lang.Number getTokenTtl();
The initial ttl of the token to generate in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_ttl DataVaultKubernetesAuthBackendRole#token_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_ttl DataVaultKubernetesAuthBackendRole#token_ttl}
---
@@ -1522,7 +1522,7 @@ public java.lang.String getTokenType();
The type of token to generate, service or batch.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_type DataVaultKubernetesAuthBackendRole#token_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_type DataVaultKubernetesAuthBackendRole#token_type}
---
diff --git a/docs/dataVaultKubernetesAuthBackendRole.python.md b/docs/dataVaultKubernetesAuthBackendRole.python.md
index 5a43144a..d7f53b32 100644
--- a/docs/dataVaultKubernetesAuthBackendRole.python.md
+++ b/docs/dataVaultKubernetesAuthBackendRole.python.md
@@ -4,7 +4,7 @@
### DataVaultKubernetesAuthBackendRole
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role vault_kubernetes_auth_backend_role}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role vault_kubernetes_auth_backend_role}.
#### Initializers
@@ -52,7 +52,7 @@ dataVaultKubernetesAuthBackendRole.DataVaultKubernetesAuthBackendRole(
| role_name
| str
| Name of the role. |
| audience
| str
| Optional Audience claim to verify in the JWT. |
| backend
| str
| Unique name of the kubernetes backend to configure. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#id DataVaultKubernetesAuthBackendRole#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#id DataVaultKubernetesAuthBackendRole#id}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
| token_bound_cidrs
| typing.List[str]
| Specifies the blocks of IP addresses which are allowed to use the generated token. |
| token_explicit_max_ttl
| typing.Union[int, float]
| Generated Token's Explicit Maximum TTL in seconds. |
@@ -132,7 +132,7 @@ Must be unique amongst siblings in the same scope
Name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#role_name DataVaultKubernetesAuthBackendRole#role_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#role_name DataVaultKubernetesAuthBackendRole#role_name}
---
@@ -142,7 +142,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Optional Audience claim to verify in the JWT.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#audience DataVaultKubernetesAuthBackendRole#audience}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#audience DataVaultKubernetesAuthBackendRole#audience}
---
@@ -152,7 +152,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Unique name of the kubernetes backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#backend DataVaultKubernetesAuthBackendRole#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#backend DataVaultKubernetesAuthBackendRole#backend}
---
@@ -160,7 +160,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#id DataVaultKubernetesAuthBackendRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#id DataVaultKubernetesAuthBackendRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -173,7 +173,7 @@ If you experience problems setting this value it might not be settable. Please t
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#namespace DataVaultKubernetesAuthBackendRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#namespace DataVaultKubernetesAuthBackendRole#namespace}
---
@@ -183,7 +183,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Specifies the blocks of IP addresses which are allowed to use the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_bound_cidrs DataVaultKubernetesAuthBackendRole#token_bound_cidrs}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_bound_cidrs DataVaultKubernetesAuthBackendRole#token_bound_cidrs}
---
@@ -193,7 +193,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Generated Token's Explicit Maximum TTL in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_explicit_max_ttl DataVaultKubernetesAuthBackendRole#token_explicit_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_explicit_max_ttl DataVaultKubernetesAuthBackendRole#token_explicit_max_ttl}
---
@@ -203,7 +203,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The maximum lifetime of the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_max_ttl DataVaultKubernetesAuthBackendRole#token_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_max_ttl DataVaultKubernetesAuthBackendRole#token_max_ttl}
---
@@ -213,7 +213,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
If true, the 'default' policy will not automatically be added to generated tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_no_default_policy DataVaultKubernetesAuthBackendRole#token_no_default_policy}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_no_default_policy DataVaultKubernetesAuthBackendRole#token_no_default_policy}
---
@@ -223,7 +223,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The maximum number of times a token may be used, a value of zero means unlimited.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_num_uses DataVaultKubernetesAuthBackendRole#token_num_uses}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_num_uses DataVaultKubernetesAuthBackendRole#token_num_uses}
---
@@ -233,7 +233,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Generated Token's Period.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_period DataVaultKubernetesAuthBackendRole#token_period}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_period DataVaultKubernetesAuthBackendRole#token_period}
---
@@ -243,7 +243,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Generated Token's Policies.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_policies DataVaultKubernetesAuthBackendRole#token_policies}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_policies DataVaultKubernetesAuthBackendRole#token_policies}
---
@@ -253,7 +253,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The initial ttl of the token to generate in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_ttl DataVaultKubernetesAuthBackendRole#token_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_ttl DataVaultKubernetesAuthBackendRole#token_ttl}
---
@@ -263,7 +263,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The type of token to generate, service or batch.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_type DataVaultKubernetesAuthBackendRole#token_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_type DataVaultKubernetesAuthBackendRole#token_type}
---
@@ -713,7 +713,7 @@ The construct id used in the generated config for the DataVaultKubernetesAuthBac
The id of the existing DataVaultKubernetesAuthBackendRole that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#import import section} in the documentation of this resource for the id to use
---
@@ -1273,7 +1273,7 @@ dataVaultKubernetesAuthBackendRole.DataVaultKubernetesAuthBackendRoleConfig(
| role_name
| str
| Name of the role. |
| audience
| str
| Optional Audience claim to verify in the JWT. |
| backend
| str
| Unique name of the kubernetes backend to configure. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#id DataVaultKubernetesAuthBackendRole#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#id DataVaultKubernetesAuthBackendRole#id}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
| token_bound_cidrs
| typing.List[str]
| Specifies the blocks of IP addresses which are allowed to use the generated token. |
| token_explicit_max_ttl
| typing.Union[int, float]
| Generated Token's Explicit Maximum TTL in seconds. |
@@ -1367,7 +1367,7 @@ role_name: str
Name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#role_name DataVaultKubernetesAuthBackendRole#role_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#role_name DataVaultKubernetesAuthBackendRole#role_name}
---
@@ -1381,7 +1381,7 @@ audience: str
Optional Audience claim to verify in the JWT.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#audience DataVaultKubernetesAuthBackendRole#audience}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#audience DataVaultKubernetesAuthBackendRole#audience}
---
@@ -1395,7 +1395,7 @@ backend: str
Unique name of the kubernetes backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#backend DataVaultKubernetesAuthBackendRole#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#backend DataVaultKubernetesAuthBackendRole#backend}
---
@@ -1407,7 +1407,7 @@ id: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#id DataVaultKubernetesAuthBackendRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#id DataVaultKubernetesAuthBackendRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1424,7 +1424,7 @@ namespace: str
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#namespace DataVaultKubernetesAuthBackendRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#namespace DataVaultKubernetesAuthBackendRole#namespace}
---
@@ -1438,7 +1438,7 @@ token_bound_cidrs: typing.List[str]
Specifies the blocks of IP addresses which are allowed to use the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_bound_cidrs DataVaultKubernetesAuthBackendRole#token_bound_cidrs}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_bound_cidrs DataVaultKubernetesAuthBackendRole#token_bound_cidrs}
---
@@ -1452,7 +1452,7 @@ token_explicit_max_ttl: typing.Union[int, float]
Generated Token's Explicit Maximum TTL in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_explicit_max_ttl DataVaultKubernetesAuthBackendRole#token_explicit_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_explicit_max_ttl DataVaultKubernetesAuthBackendRole#token_explicit_max_ttl}
---
@@ -1466,7 +1466,7 @@ token_max_ttl: typing.Union[int, float]
The maximum lifetime of the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_max_ttl DataVaultKubernetesAuthBackendRole#token_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_max_ttl DataVaultKubernetesAuthBackendRole#token_max_ttl}
---
@@ -1480,7 +1480,7 @@ token_no_default_policy: typing.Union[bool, IResolvable]
If true, the 'default' policy will not automatically be added to generated tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_no_default_policy DataVaultKubernetesAuthBackendRole#token_no_default_policy}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_no_default_policy DataVaultKubernetesAuthBackendRole#token_no_default_policy}
---
@@ -1494,7 +1494,7 @@ token_num_uses: typing.Union[int, float]
The maximum number of times a token may be used, a value of zero means unlimited.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_num_uses DataVaultKubernetesAuthBackendRole#token_num_uses}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_num_uses DataVaultKubernetesAuthBackendRole#token_num_uses}
---
@@ -1508,7 +1508,7 @@ token_period: typing.Union[int, float]
Generated Token's Period.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_period DataVaultKubernetesAuthBackendRole#token_period}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_period DataVaultKubernetesAuthBackendRole#token_period}
---
@@ -1522,7 +1522,7 @@ token_policies: typing.List[str]
Generated Token's Policies.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_policies DataVaultKubernetesAuthBackendRole#token_policies}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_policies DataVaultKubernetesAuthBackendRole#token_policies}
---
@@ -1536,7 +1536,7 @@ token_ttl: typing.Union[int, float]
The initial ttl of the token to generate in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_ttl DataVaultKubernetesAuthBackendRole#token_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_ttl DataVaultKubernetesAuthBackendRole#token_ttl}
---
@@ -1550,7 +1550,7 @@ token_type: str
The type of token to generate, service or batch.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_type DataVaultKubernetesAuthBackendRole#token_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_type DataVaultKubernetesAuthBackendRole#token_type}
---
diff --git a/docs/dataVaultKubernetesAuthBackendRole.typescript.md b/docs/dataVaultKubernetesAuthBackendRole.typescript.md
index 6c162781..212a3f6a 100644
--- a/docs/dataVaultKubernetesAuthBackendRole.typescript.md
+++ b/docs/dataVaultKubernetesAuthBackendRole.typescript.md
@@ -4,7 +4,7 @@
### DataVaultKubernetesAuthBackendRole
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role vault_kubernetes_auth_backend_role}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role vault_kubernetes_auth_backend_role}.
#### Initializers
@@ -456,7 +456,7 @@ The construct id used in the generated config for the DataVaultKubernetesAuthBac
The id of the existing DataVaultKubernetesAuthBackendRole that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#import import section} in the documentation of this resource for the id to use
---
@@ -994,7 +994,7 @@ const dataVaultKubernetesAuthBackendRoleConfig: dataVaultKubernetesAuthBackendRo
| roleName
| string
| Name of the role. |
| audience
| string
| Optional Audience claim to verify in the JWT. |
| backend
| string
| Unique name of the kubernetes backend to configure. |
-| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#id DataVaultKubernetesAuthBackendRole#id}. |
+| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#id DataVaultKubernetesAuthBackendRole#id}. |
| namespace
| string
| Target namespace. (requires Enterprise). |
| tokenBoundCidrs
| string[]
| Specifies the blocks of IP addresses which are allowed to use the generated token. |
| tokenExplicitMaxTtl
| number
| Generated Token's Explicit Maximum TTL in seconds. |
@@ -1088,7 +1088,7 @@ public readonly roleName: string;
Name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#role_name DataVaultKubernetesAuthBackendRole#role_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#role_name DataVaultKubernetesAuthBackendRole#role_name}
---
@@ -1102,7 +1102,7 @@ public readonly audience: string;
Optional Audience claim to verify in the JWT.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#audience DataVaultKubernetesAuthBackendRole#audience}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#audience DataVaultKubernetesAuthBackendRole#audience}
---
@@ -1116,7 +1116,7 @@ public readonly backend: string;
Unique name of the kubernetes backend to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#backend DataVaultKubernetesAuthBackendRole#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#backend DataVaultKubernetesAuthBackendRole#backend}
---
@@ -1128,7 +1128,7 @@ public readonly id: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#id DataVaultKubernetesAuthBackendRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#id DataVaultKubernetesAuthBackendRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1145,7 +1145,7 @@ public readonly namespace: string;
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#namespace DataVaultKubernetesAuthBackendRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#namespace DataVaultKubernetesAuthBackendRole#namespace}
---
@@ -1159,7 +1159,7 @@ public readonly tokenBoundCidrs: string[];
Specifies the blocks of IP addresses which are allowed to use the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_bound_cidrs DataVaultKubernetesAuthBackendRole#token_bound_cidrs}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_bound_cidrs DataVaultKubernetesAuthBackendRole#token_bound_cidrs}
---
@@ -1173,7 +1173,7 @@ public readonly tokenExplicitMaxTtl: number;
Generated Token's Explicit Maximum TTL in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_explicit_max_ttl DataVaultKubernetesAuthBackendRole#token_explicit_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_explicit_max_ttl DataVaultKubernetesAuthBackendRole#token_explicit_max_ttl}
---
@@ -1187,7 +1187,7 @@ public readonly tokenMaxTtl: number;
The maximum lifetime of the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_max_ttl DataVaultKubernetesAuthBackendRole#token_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_max_ttl DataVaultKubernetesAuthBackendRole#token_max_ttl}
---
@@ -1201,7 +1201,7 @@ public readonly tokenNoDefaultPolicy: boolean | IResolvable;
If true, the 'default' policy will not automatically be added to generated tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_no_default_policy DataVaultKubernetesAuthBackendRole#token_no_default_policy}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_no_default_policy DataVaultKubernetesAuthBackendRole#token_no_default_policy}
---
@@ -1215,7 +1215,7 @@ public readonly tokenNumUses: number;
The maximum number of times a token may be used, a value of zero means unlimited.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_num_uses DataVaultKubernetesAuthBackendRole#token_num_uses}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_num_uses DataVaultKubernetesAuthBackendRole#token_num_uses}
---
@@ -1229,7 +1229,7 @@ public readonly tokenPeriod: number;
Generated Token's Period.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_period DataVaultKubernetesAuthBackendRole#token_period}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_period DataVaultKubernetesAuthBackendRole#token_period}
---
@@ -1243,7 +1243,7 @@ public readonly tokenPolicies: string[];
Generated Token's Policies.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_policies DataVaultKubernetesAuthBackendRole#token_policies}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_policies DataVaultKubernetesAuthBackendRole#token_policies}
---
@@ -1257,7 +1257,7 @@ public readonly tokenTtl: number;
The initial ttl of the token to generate in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_ttl DataVaultKubernetesAuthBackendRole#token_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_ttl DataVaultKubernetesAuthBackendRole#token_ttl}
---
@@ -1271,7 +1271,7 @@ public readonly tokenType: string;
The type of token to generate, service or batch.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_type DataVaultKubernetesAuthBackendRole#token_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_type DataVaultKubernetesAuthBackendRole#token_type}
---
diff --git a/docs/dataVaultKubernetesServiceAccountToken.csharp.md b/docs/dataVaultKubernetesServiceAccountToken.csharp.md
index 56b0dc08..53a17016 100644
--- a/docs/dataVaultKubernetesServiceAccountToken.csharp.md
+++ b/docs/dataVaultKubernetesServiceAccountToken.csharp.md
@@ -4,7 +4,7 @@
### DataVaultKubernetesServiceAccountToken
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token vault_kubernetes_service_account_token}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token vault_kubernetes_service_account_token}.
#### Initializers
@@ -393,7 +393,7 @@ The construct id used in the generated config for the DataVaultKubernetesService
The id of the existing DataVaultKubernetesServiceAccountToken that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#import import section} in the documentation of this resource for the id to use
---
@@ -826,7 +826,7 @@ new DataVaultKubernetesServiceAccountTokenConfig {
| KubernetesNamespace
| string
| The name of the Kubernetes namespace in which to generate the credentials. |
| Role
| string
| The name of the role. |
| ClusterRoleBinding
| object
| If true, generate a ClusterRoleBinding to grant permissions across the whole cluster instead of within a namespace. |
-| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#id DataVaultKubernetesServiceAccountToken#id}. |
+| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#id DataVaultKubernetesServiceAccountToken#id}. |
| Namespace
| string
| Target namespace. (requires Enterprise). |
| Ttl
| string
| The TTL of the generated Kubernetes service account token, specified in seconds or as a Go duration format string. |
@@ -912,7 +912,7 @@ public string Backend { get; set; }
The Kubernetes secret backend to generate service account tokens from.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#backend DataVaultKubernetesServiceAccountToken#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#backend DataVaultKubernetesServiceAccountToken#backend}
---
@@ -926,7 +926,7 @@ public string KubernetesNamespace { get; set; }
The name of the Kubernetes namespace in which to generate the credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#kubernetes_namespace DataVaultKubernetesServiceAccountToken#kubernetes_namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#kubernetes_namespace DataVaultKubernetesServiceAccountToken#kubernetes_namespace}
---
@@ -940,7 +940,7 @@ public string Role { get; set; }
The name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#role DataVaultKubernetesServiceAccountToken#role}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#role DataVaultKubernetesServiceAccountToken#role}
---
@@ -954,7 +954,7 @@ public object ClusterRoleBinding { get; set; }
If true, generate a ClusterRoleBinding to grant permissions across the whole cluster instead of within a namespace.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#cluster_role_binding DataVaultKubernetesServiceAccountToken#cluster_role_binding}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#cluster_role_binding DataVaultKubernetesServiceAccountToken#cluster_role_binding}
---
@@ -966,7 +966,7 @@ public string Id { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#id DataVaultKubernetesServiceAccountToken#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#id DataVaultKubernetesServiceAccountToken#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -983,7 +983,7 @@ public string Namespace { get; set; }
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#namespace DataVaultKubernetesServiceAccountToken#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#namespace DataVaultKubernetesServiceAccountToken#namespace}
---
@@ -997,7 +997,7 @@ public string Ttl { get; set; }
The TTL of the generated Kubernetes service account token, specified in seconds or as a Go duration format string.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#ttl DataVaultKubernetesServiceAccountToken#ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#ttl DataVaultKubernetesServiceAccountToken#ttl}
---
diff --git a/docs/dataVaultKubernetesServiceAccountToken.go.md b/docs/dataVaultKubernetesServiceAccountToken.go.md
index 9ffe34cb..340ab18c 100644
--- a/docs/dataVaultKubernetesServiceAccountToken.go.md
+++ b/docs/dataVaultKubernetesServiceAccountToken.go.md
@@ -4,7 +4,7 @@
### DataVaultKubernetesServiceAccountToken
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token vault_kubernetes_service_account_token}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token vault_kubernetes_service_account_token}.
#### Initializers
@@ -393,7 +393,7 @@ The construct id used in the generated config for the DataVaultKubernetesService
The id of the existing DataVaultKubernetesServiceAccountToken that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#import import section} in the documentation of this resource for the id to use
---
@@ -826,7 +826,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultkubernetesse
| KubernetesNamespace
| *string
| The name of the Kubernetes namespace in which to generate the credentials. |
| Role
| *string
| The name of the role. |
| ClusterRoleBinding
| interface{}
| If true, generate a ClusterRoleBinding to grant permissions across the whole cluster instead of within a namespace. |
-| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#id DataVaultKubernetesServiceAccountToken#id}. |
+| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#id DataVaultKubernetesServiceAccountToken#id}. |
| Namespace
| *string
| Target namespace. (requires Enterprise). |
| Ttl
| *string
| The TTL of the generated Kubernetes service account token, specified in seconds or as a Go duration format string. |
@@ -912,7 +912,7 @@ Backend *string
The Kubernetes secret backend to generate service account tokens from.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#backend DataVaultKubernetesServiceAccountToken#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#backend DataVaultKubernetesServiceAccountToken#backend}
---
@@ -926,7 +926,7 @@ KubernetesNamespace *string
The name of the Kubernetes namespace in which to generate the credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#kubernetes_namespace DataVaultKubernetesServiceAccountToken#kubernetes_namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#kubernetes_namespace DataVaultKubernetesServiceAccountToken#kubernetes_namespace}
---
@@ -940,7 +940,7 @@ Role *string
The name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#role DataVaultKubernetesServiceAccountToken#role}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#role DataVaultKubernetesServiceAccountToken#role}
---
@@ -954,7 +954,7 @@ ClusterRoleBinding interface{}
If true, generate a ClusterRoleBinding to grant permissions across the whole cluster instead of within a namespace.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#cluster_role_binding DataVaultKubernetesServiceAccountToken#cluster_role_binding}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#cluster_role_binding DataVaultKubernetesServiceAccountToken#cluster_role_binding}
---
@@ -966,7 +966,7 @@ Id *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#id DataVaultKubernetesServiceAccountToken#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#id DataVaultKubernetesServiceAccountToken#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -983,7 +983,7 @@ Namespace *string
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#namespace DataVaultKubernetesServiceAccountToken#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#namespace DataVaultKubernetesServiceAccountToken#namespace}
---
@@ -997,7 +997,7 @@ Ttl *string
The TTL of the generated Kubernetes service account token, specified in seconds or as a Go duration format string.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#ttl DataVaultKubernetesServiceAccountToken#ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#ttl DataVaultKubernetesServiceAccountToken#ttl}
---
diff --git a/docs/dataVaultKubernetesServiceAccountToken.java.md b/docs/dataVaultKubernetesServiceAccountToken.java.md
index ba4f60b4..0385a41c 100644
--- a/docs/dataVaultKubernetesServiceAccountToken.java.md
+++ b/docs/dataVaultKubernetesServiceAccountToken.java.md
@@ -4,7 +4,7 @@
### DataVaultKubernetesServiceAccountToken
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token vault_kubernetes_service_account_token}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token vault_kubernetes_service_account_token}.
#### Initializers
@@ -49,7 +49,7 @@ DataVaultKubernetesServiceAccountToken.Builder.create(Construct scope, java.lang
| kubernetesNamespace
| java.lang.String
| The name of the Kubernetes namespace in which to generate the credentials. |
| role
| java.lang.String
| The name of the role. |
| clusterRoleBinding
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| If true, generate a ClusterRoleBinding to grant permissions across the whole cluster instead of within a namespace. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#id DataVaultKubernetesServiceAccountToken#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#id DataVaultKubernetesServiceAccountToken#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
| ttl
| java.lang.String
| The TTL of the generated Kubernetes service account token, specified in seconds or as a Go duration format string. |
@@ -121,7 +121,7 @@ Must be unique amongst siblings in the same scope
The Kubernetes secret backend to generate service account tokens from.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#backend DataVaultKubernetesServiceAccountToken#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#backend DataVaultKubernetesServiceAccountToken#backend}
---
@@ -131,7 +131,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The name of the Kubernetes namespace in which to generate the credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#kubernetes_namespace DataVaultKubernetesServiceAccountToken#kubernetes_namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#kubernetes_namespace DataVaultKubernetesServiceAccountToken#kubernetes_namespace}
---
@@ -141,7 +141,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#role DataVaultKubernetesServiceAccountToken#role}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#role DataVaultKubernetesServiceAccountToken#role}
---
@@ -151,7 +151,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
If true, generate a ClusterRoleBinding to grant permissions across the whole cluster instead of within a namespace.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#cluster_role_binding DataVaultKubernetesServiceAccountToken#cluster_role_binding}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#cluster_role_binding DataVaultKubernetesServiceAccountToken#cluster_role_binding}
---
@@ -159,7 +159,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#id DataVaultKubernetesServiceAccountToken#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#id DataVaultKubernetesServiceAccountToken#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -172,7 +172,7 @@ If you experience problems setting this value it might not be settable. Please t
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#namespace DataVaultKubernetesServiceAccountToken#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#namespace DataVaultKubernetesServiceAccountToken#namespace}
---
@@ -182,7 +182,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The TTL of the generated Kubernetes service account token, specified in seconds or as a Go duration format string.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#ttl DataVaultKubernetesServiceAccountToken#ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#ttl DataVaultKubernetesServiceAccountToken#ttl}
---
@@ -533,7 +533,7 @@ The construct id used in the generated config for the DataVaultKubernetesService
The id of the existing DataVaultKubernetesServiceAccountToken that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#import import section} in the documentation of this resource for the id to use
---
@@ -971,7 +971,7 @@ DataVaultKubernetesServiceAccountTokenConfig.builder()
| kubernetesNamespace
| java.lang.String
| The name of the Kubernetes namespace in which to generate the credentials. |
| role
| java.lang.String
| The name of the role. |
| clusterRoleBinding
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| If true, generate a ClusterRoleBinding to grant permissions across the whole cluster instead of within a namespace. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#id DataVaultKubernetesServiceAccountToken#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#id DataVaultKubernetesServiceAccountToken#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
| ttl
| java.lang.String
| The TTL of the generated Kubernetes service account token, specified in seconds or as a Go duration format string. |
@@ -1057,7 +1057,7 @@ public java.lang.String getBackend();
The Kubernetes secret backend to generate service account tokens from.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#backend DataVaultKubernetesServiceAccountToken#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#backend DataVaultKubernetesServiceAccountToken#backend}
---
@@ -1071,7 +1071,7 @@ public java.lang.String getKubernetesNamespace();
The name of the Kubernetes namespace in which to generate the credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#kubernetes_namespace DataVaultKubernetesServiceAccountToken#kubernetes_namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#kubernetes_namespace DataVaultKubernetesServiceAccountToken#kubernetes_namespace}
---
@@ -1085,7 +1085,7 @@ public java.lang.String getRole();
The name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#role DataVaultKubernetesServiceAccountToken#role}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#role DataVaultKubernetesServiceAccountToken#role}
---
@@ -1099,7 +1099,7 @@ public java.lang.Object getClusterRoleBinding();
If true, generate a ClusterRoleBinding to grant permissions across the whole cluster instead of within a namespace.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#cluster_role_binding DataVaultKubernetesServiceAccountToken#cluster_role_binding}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#cluster_role_binding DataVaultKubernetesServiceAccountToken#cluster_role_binding}
---
@@ -1111,7 +1111,7 @@ public java.lang.String getId();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#id DataVaultKubernetesServiceAccountToken#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#id DataVaultKubernetesServiceAccountToken#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1128,7 +1128,7 @@ public java.lang.String getNamespace();
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#namespace DataVaultKubernetesServiceAccountToken#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#namespace DataVaultKubernetesServiceAccountToken#namespace}
---
@@ -1142,7 +1142,7 @@ public java.lang.String getTtl();
The TTL of the generated Kubernetes service account token, specified in seconds or as a Go duration format string.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#ttl DataVaultKubernetesServiceAccountToken#ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#ttl DataVaultKubernetesServiceAccountToken#ttl}
---
diff --git a/docs/dataVaultKubernetesServiceAccountToken.python.md b/docs/dataVaultKubernetesServiceAccountToken.python.md
index ec187e57..cae1a71b 100644
--- a/docs/dataVaultKubernetesServiceAccountToken.python.md
+++ b/docs/dataVaultKubernetesServiceAccountToken.python.md
@@ -4,7 +4,7 @@
### DataVaultKubernetesServiceAccountToken
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token vault_kubernetes_service_account_token}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token vault_kubernetes_service_account_token}.
#### Initializers
@@ -46,7 +46,7 @@ dataVaultKubernetesServiceAccountToken.DataVaultKubernetesServiceAccountToken(
| kubernetes_namespace
| str
| The name of the Kubernetes namespace in which to generate the credentials. |
| role
| str
| The name of the role. |
| cluster_role_binding
| typing.Union[bool, cdktf.IResolvable]
| If true, generate a ClusterRoleBinding to grant permissions across the whole cluster instead of within a namespace. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#id DataVaultKubernetesServiceAccountToken#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#id DataVaultKubernetesServiceAccountToken#id}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
| ttl
| str
| The TTL of the generated Kubernetes service account token, specified in seconds or as a Go duration format string. |
@@ -118,7 +118,7 @@ Must be unique amongst siblings in the same scope
The Kubernetes secret backend to generate service account tokens from.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#backend DataVaultKubernetesServiceAccountToken#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#backend DataVaultKubernetesServiceAccountToken#backend}
---
@@ -128,7 +128,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The name of the Kubernetes namespace in which to generate the credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#kubernetes_namespace DataVaultKubernetesServiceAccountToken#kubernetes_namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#kubernetes_namespace DataVaultKubernetesServiceAccountToken#kubernetes_namespace}
---
@@ -138,7 +138,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#role DataVaultKubernetesServiceAccountToken#role}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#role DataVaultKubernetesServiceAccountToken#role}
---
@@ -148,7 +148,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
If true, generate a ClusterRoleBinding to grant permissions across the whole cluster instead of within a namespace.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#cluster_role_binding DataVaultKubernetesServiceAccountToken#cluster_role_binding}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#cluster_role_binding DataVaultKubernetesServiceAccountToken#cluster_role_binding}
---
@@ -156,7 +156,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#id DataVaultKubernetesServiceAccountToken#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#id DataVaultKubernetesServiceAccountToken#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -169,7 +169,7 @@ If you experience problems setting this value it might not be settable. Please t
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#namespace DataVaultKubernetesServiceAccountToken#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#namespace DataVaultKubernetesServiceAccountToken#namespace}
---
@@ -179,7 +179,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The TTL of the generated Kubernetes service account token, specified in seconds or as a Go duration format string.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#ttl DataVaultKubernetesServiceAccountToken#ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#ttl DataVaultKubernetesServiceAccountToken#ttl}
---
@@ -566,7 +566,7 @@ The construct id used in the generated config for the DataVaultKubernetesService
The id of the existing DataVaultKubernetesServiceAccountToken that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#import import section} in the documentation of this resource for the id to use
---
@@ -999,7 +999,7 @@ dataVaultKubernetesServiceAccountToken.DataVaultKubernetesServiceAccountTokenCon
| kubernetes_namespace
| str
| The name of the Kubernetes namespace in which to generate the credentials. |
| role
| str
| The name of the role. |
| cluster_role_binding
| typing.Union[bool, cdktf.IResolvable]
| If true, generate a ClusterRoleBinding to grant permissions across the whole cluster instead of within a namespace. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#id DataVaultKubernetesServiceAccountToken#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#id DataVaultKubernetesServiceAccountToken#id}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
| ttl
| str
| The TTL of the generated Kubernetes service account token, specified in seconds or as a Go duration format string. |
@@ -1085,7 +1085,7 @@ backend: str
The Kubernetes secret backend to generate service account tokens from.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#backend DataVaultKubernetesServiceAccountToken#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#backend DataVaultKubernetesServiceAccountToken#backend}
---
@@ -1099,7 +1099,7 @@ kubernetes_namespace: str
The name of the Kubernetes namespace in which to generate the credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#kubernetes_namespace DataVaultKubernetesServiceAccountToken#kubernetes_namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#kubernetes_namespace DataVaultKubernetesServiceAccountToken#kubernetes_namespace}
---
@@ -1113,7 +1113,7 @@ role: str
The name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#role DataVaultKubernetesServiceAccountToken#role}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#role DataVaultKubernetesServiceAccountToken#role}
---
@@ -1127,7 +1127,7 @@ cluster_role_binding: typing.Union[bool, IResolvable]
If true, generate a ClusterRoleBinding to grant permissions across the whole cluster instead of within a namespace.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#cluster_role_binding DataVaultKubernetesServiceAccountToken#cluster_role_binding}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#cluster_role_binding DataVaultKubernetesServiceAccountToken#cluster_role_binding}
---
@@ -1139,7 +1139,7 @@ id: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#id DataVaultKubernetesServiceAccountToken#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#id DataVaultKubernetesServiceAccountToken#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1156,7 +1156,7 @@ namespace: str
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#namespace DataVaultKubernetesServiceAccountToken#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#namespace DataVaultKubernetesServiceAccountToken#namespace}
---
@@ -1170,7 +1170,7 @@ ttl: str
The TTL of the generated Kubernetes service account token, specified in seconds or as a Go duration format string.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#ttl DataVaultKubernetesServiceAccountToken#ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#ttl DataVaultKubernetesServiceAccountToken#ttl}
---
diff --git a/docs/dataVaultKubernetesServiceAccountToken.typescript.md b/docs/dataVaultKubernetesServiceAccountToken.typescript.md
index 5ed5ad24..343aab69 100644
--- a/docs/dataVaultKubernetesServiceAccountToken.typescript.md
+++ b/docs/dataVaultKubernetesServiceAccountToken.typescript.md
@@ -4,7 +4,7 @@
### DataVaultKubernetesServiceAccountToken
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token vault_kubernetes_service_account_token}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token vault_kubernetes_service_account_token}.
#### Initializers
@@ -393,7 +393,7 @@ The construct id used in the generated config for the DataVaultKubernetesService
The id of the existing DataVaultKubernetesServiceAccountToken that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#import import section} in the documentation of this resource for the id to use
---
@@ -811,7 +811,7 @@ const dataVaultKubernetesServiceAccountTokenConfig: dataVaultKubernetesServiceAc
| kubernetesNamespace
| string
| The name of the Kubernetes namespace in which to generate the credentials. |
| role
| string
| The name of the role. |
| clusterRoleBinding
| boolean \| cdktf.IResolvable
| If true, generate a ClusterRoleBinding to grant permissions across the whole cluster instead of within a namespace. |
-| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#id DataVaultKubernetesServiceAccountToken#id}. |
+| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#id DataVaultKubernetesServiceAccountToken#id}. |
| namespace
| string
| Target namespace. (requires Enterprise). |
| ttl
| string
| The TTL of the generated Kubernetes service account token, specified in seconds or as a Go duration format string. |
@@ -897,7 +897,7 @@ public readonly backend: string;
The Kubernetes secret backend to generate service account tokens from.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#backend DataVaultKubernetesServiceAccountToken#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#backend DataVaultKubernetesServiceAccountToken#backend}
---
@@ -911,7 +911,7 @@ public readonly kubernetesNamespace: string;
The name of the Kubernetes namespace in which to generate the credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#kubernetes_namespace DataVaultKubernetesServiceAccountToken#kubernetes_namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#kubernetes_namespace DataVaultKubernetesServiceAccountToken#kubernetes_namespace}
---
@@ -925,7 +925,7 @@ public readonly role: string;
The name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#role DataVaultKubernetesServiceAccountToken#role}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#role DataVaultKubernetesServiceAccountToken#role}
---
@@ -939,7 +939,7 @@ public readonly clusterRoleBinding: boolean | IResolvable;
If true, generate a ClusterRoleBinding to grant permissions across the whole cluster instead of within a namespace.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#cluster_role_binding DataVaultKubernetesServiceAccountToken#cluster_role_binding}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#cluster_role_binding DataVaultKubernetesServiceAccountToken#cluster_role_binding}
---
@@ -951,7 +951,7 @@ public readonly id: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#id DataVaultKubernetesServiceAccountToken#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#id DataVaultKubernetesServiceAccountToken#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -968,7 +968,7 @@ public readonly namespace: string;
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#namespace DataVaultKubernetesServiceAccountToken#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#namespace DataVaultKubernetesServiceAccountToken#namespace}
---
@@ -982,7 +982,7 @@ public readonly ttl: string;
The TTL of the generated Kubernetes service account token, specified in seconds or as a Go duration format string.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#ttl DataVaultKubernetesServiceAccountToken#ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#ttl DataVaultKubernetesServiceAccountToken#ttl}
---
diff --git a/docs/dataVaultKvSecret.csharp.md b/docs/dataVaultKvSecret.csharp.md
index 0c8a5868..48b7f4e9 100644
--- a/docs/dataVaultKvSecret.csharp.md
+++ b/docs/dataVaultKvSecret.csharp.md
@@ -4,7 +4,7 @@
### DataVaultKvSecret
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret vault_kv_secret}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret vault_kv_secret}.
#### Initializers
@@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultKvSecret to impor
The id of the existing DataVaultKvSecret that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret#import import section} in the documentation of this resource for the id to use
---
@@ -706,7 +706,7 @@ new DataVaultKvSecretConfig {
| Provider
| HashiCorp.Cdktf.TerraformProvider
| *No description.* |
| Provisioners
| object[]
| *No description.* |
| Path
| string
| Full path of the KV-V1 secret. |
-| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret#id DataVaultKvSecret#id}. |
+| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret#id DataVaultKvSecret#id}. |
| Namespace
| string
| Target namespace. (requires Enterprise). |
---
@@ -791,7 +791,7 @@ public string Path { get; set; }
Full path of the KV-V1 secret.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret#path DataVaultKvSecret#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret#path DataVaultKvSecret#path}
---
@@ -803,7 +803,7 @@ public string Id { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret#id DataVaultKvSecret#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret#id DataVaultKvSecret#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -820,7 +820,7 @@ public string Namespace { get; set; }
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret#namespace DataVaultKvSecret#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret#namespace DataVaultKvSecret#namespace}
---
diff --git a/docs/dataVaultKvSecret.go.md b/docs/dataVaultKvSecret.go.md
index d64a6154..a6560146 100644
--- a/docs/dataVaultKvSecret.go.md
+++ b/docs/dataVaultKvSecret.go.md
@@ -4,7 +4,7 @@
### DataVaultKvSecret
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret vault_kv_secret}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret vault_kv_secret}.
#### Initializers
@@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultKvSecret to impor
The id of the existing DataVaultKvSecret that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret#import import section} in the documentation of this resource for the id to use
---
@@ -706,7 +706,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultkvsecret"
| Provider
| github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProvider
| *No description.* |
| Provisioners
| *[]interface{}
| *No description.* |
| Path
| *string
| Full path of the KV-V1 secret. |
-| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret#id DataVaultKvSecret#id}. |
+| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret#id DataVaultKvSecret#id}. |
| Namespace
| *string
| Target namespace. (requires Enterprise). |
---
@@ -791,7 +791,7 @@ Path *string
Full path of the KV-V1 secret.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret#path DataVaultKvSecret#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret#path DataVaultKvSecret#path}
---
@@ -803,7 +803,7 @@ Id *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret#id DataVaultKvSecret#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret#id DataVaultKvSecret#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -820,7 +820,7 @@ Namespace *string
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret#namespace DataVaultKvSecret#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret#namespace DataVaultKvSecret#namespace}
---
diff --git a/docs/dataVaultKvSecret.java.md b/docs/dataVaultKvSecret.java.md
index ba80ed54..199e12cd 100644
--- a/docs/dataVaultKvSecret.java.md
+++ b/docs/dataVaultKvSecret.java.md
@@ -4,7 +4,7 @@
### DataVaultKvSecret
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret vault_kv_secret}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret vault_kv_secret}.
#### Initializers
@@ -41,7 +41,7 @@ DataVaultKvSecret.Builder.create(Construct scope, java.lang.String id)
| provider
| com.hashicorp.cdktf.TerraformProvider
| *No description.* |
| provisioners
| java.util.List
| *No description.* |
| path
| java.lang.String
| Full path of the KV-V1 secret. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret#id DataVaultKvSecret#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret#id DataVaultKvSecret#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
---
@@ -112,7 +112,7 @@ Must be unique amongst siblings in the same scope
Full path of the KV-V1 secret.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret#path DataVaultKvSecret#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret#path DataVaultKvSecret#path}
---
@@ -120,7 +120,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret#id DataVaultKvSecret#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret#id DataVaultKvSecret#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -133,7 +133,7 @@ If you experience problems setting this value it might not be settable. Please t
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret#namespace DataVaultKvSecret#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret#namespace DataVaultKvSecret#namespace}
---
@@ -470,7 +470,7 @@ The construct id used in the generated config for the DataVaultKvSecret to impor
The id of the existing DataVaultKvSecret that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret#import import section} in the documentation of this resource for the id to use
---
@@ -801,7 +801,7 @@ DataVaultKvSecretConfig.builder()
| provider
| com.hashicorp.cdktf.TerraformProvider
| *No description.* |
| provisioners
| java.util.List
| *No description.* |
| path
| java.lang.String
| Full path of the KV-V1 secret. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret#id DataVaultKvSecret#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret#id DataVaultKvSecret#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
---
@@ -886,7 +886,7 @@ public java.lang.String getPath();
Full path of the KV-V1 secret.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret#path DataVaultKvSecret#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret#path DataVaultKvSecret#path}
---
@@ -898,7 +898,7 @@ public java.lang.String getId();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret#id DataVaultKvSecret#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret#id DataVaultKvSecret#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -915,7 +915,7 @@ public java.lang.String getNamespace();
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret#namespace DataVaultKvSecret#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret#namespace DataVaultKvSecret#namespace}
---
diff --git a/docs/dataVaultKvSecret.python.md b/docs/dataVaultKvSecret.python.md
index 5fda237d..268bc079 100644
--- a/docs/dataVaultKvSecret.python.md
+++ b/docs/dataVaultKvSecret.python.md
@@ -4,7 +4,7 @@
### DataVaultKvSecret
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret vault_kv_secret}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret vault_kv_secret}.
#### Initializers
@@ -39,7 +39,7 @@ dataVaultKvSecret.DataVaultKvSecret(
| provider
| cdktf.TerraformProvider
| *No description.* |
| provisioners
| typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]]
| *No description.* |
| path
| str
| Full path of the KV-V1 secret. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret#id DataVaultKvSecret#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret#id DataVaultKvSecret#id}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
---
@@ -110,7 +110,7 @@ Must be unique amongst siblings in the same scope
Full path of the KV-V1 secret.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret#path DataVaultKvSecret#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret#path DataVaultKvSecret#path}
---
@@ -118,7 +118,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret#id DataVaultKvSecret#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret#id DataVaultKvSecret#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -131,7 +131,7 @@ If you experience problems setting this value it might not be settable. Please t
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret#namespace DataVaultKvSecret#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret#namespace DataVaultKvSecret#namespace}
---
@@ -504,7 +504,7 @@ The construct id used in the generated config for the DataVaultKvSecret to impor
The id of the existing DataVaultKvSecret that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret#import import section} in the documentation of this resource for the id to use
---
@@ -831,7 +831,7 @@ dataVaultKvSecret.DataVaultKvSecretConfig(
| provider
| cdktf.TerraformProvider
| *No description.* |
| provisioners
| typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]]
| *No description.* |
| path
| str
| Full path of the KV-V1 secret. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret#id DataVaultKvSecret#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret#id DataVaultKvSecret#id}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
---
@@ -916,7 +916,7 @@ path: str
Full path of the KV-V1 secret.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret#path DataVaultKvSecret#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret#path DataVaultKvSecret#path}
---
@@ -928,7 +928,7 @@ id: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret#id DataVaultKvSecret#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret#id DataVaultKvSecret#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -945,7 +945,7 @@ namespace: str
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret#namespace DataVaultKvSecret#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret#namespace DataVaultKvSecret#namespace}
---
diff --git a/docs/dataVaultKvSecret.typescript.md b/docs/dataVaultKvSecret.typescript.md
index dc86a339..c2422867 100644
--- a/docs/dataVaultKvSecret.typescript.md
+++ b/docs/dataVaultKvSecret.typescript.md
@@ -4,7 +4,7 @@
### DataVaultKvSecret
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret vault_kv_secret}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret vault_kv_secret}.
#### Initializers
@@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultKvSecret to impor
The id of the existing DataVaultKvSecret that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret#import import section} in the documentation of this resource for the id to use
---
@@ -695,7 +695,7 @@ const dataVaultKvSecretConfig: dataVaultKvSecret.DataVaultKvSecretConfig = { ...
| provider
| cdktf.TerraformProvider
| *No description.* |
| provisioners
| cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[]
| *No description.* |
| path
| string
| Full path of the KV-V1 secret. |
-| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret#id DataVaultKvSecret#id}. |
+| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret#id DataVaultKvSecret#id}. |
| namespace
| string
| Target namespace. (requires Enterprise). |
---
@@ -780,7 +780,7 @@ public readonly path: string;
Full path of the KV-V1 secret.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret#path DataVaultKvSecret#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret#path DataVaultKvSecret#path}
---
@@ -792,7 +792,7 @@ public readonly id: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret#id DataVaultKvSecret#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret#id DataVaultKvSecret#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -809,7 +809,7 @@ public readonly namespace: string;
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret#namespace DataVaultKvSecret#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret#namespace DataVaultKvSecret#namespace}
---
diff --git a/docs/dataVaultKvSecretSubkeysV2.csharp.md b/docs/dataVaultKvSecretSubkeysV2.csharp.md
index 9ebff0b3..5835ead4 100644
--- a/docs/dataVaultKvSecretSubkeysV2.csharp.md
+++ b/docs/dataVaultKvSecretSubkeysV2.csharp.md
@@ -4,7 +4,7 @@
### DataVaultKvSecretSubkeysV2
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2 vault_kv_secret_subkeys_v2}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2 vault_kv_secret_subkeys_v2}.
#### Initializers
@@ -393,7 +393,7 @@ The construct id used in the generated config for the DataVaultKvSecretSubkeysV2
The id of the existing DataVaultKvSecretSubkeysV2 that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#import import section} in the documentation of this resource for the id to use
---
@@ -769,7 +769,7 @@ new DataVaultKvSecretSubkeysV2Config {
| Mount
| string
| Path where KV-V2 engine is mounted. |
| Name
| string
| Full name of the secret. |
| Depth
| double
| Specifies the deepest nesting level to provide in the output.If non-zero, keys that reside at the specified depth value will be artificially treated as leaves and will thus be 'null' even if further underlying sub-keys exist. |
-| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#id DataVaultKvSecretSubkeysV2#id}. |
+| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#id DataVaultKvSecretSubkeysV2#id}. |
| Namespace
| string
| Target namespace. (requires Enterprise). |
| Version
| double
| Specifies the version to return. If not set the latest version is returned. |
@@ -855,7 +855,7 @@ public string Mount { get; set; }
Path where KV-V2 engine is mounted.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#mount DataVaultKvSecretSubkeysV2#mount}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#mount DataVaultKvSecretSubkeysV2#mount}
---
@@ -871,7 +871,7 @@ Full name of the secret.
For a nested secret, the name is the nested path excluding the mount and data prefix. For example, for a secret at 'kvv2/data/foo/bar/baz', the name is 'foo/bar/baz'
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#name DataVaultKvSecretSubkeysV2#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#name DataVaultKvSecretSubkeysV2#name}
---
@@ -885,7 +885,7 @@ public double Depth { get; set; }
Specifies the deepest nesting level to provide in the output.If non-zero, keys that reside at the specified depth value will be artificially treated as leaves and will thus be 'null' even if further underlying sub-keys exist.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#depth DataVaultKvSecretSubkeysV2#depth}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#depth DataVaultKvSecretSubkeysV2#depth}
---
@@ -897,7 +897,7 @@ public string Id { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#id DataVaultKvSecretSubkeysV2#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#id DataVaultKvSecretSubkeysV2#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -914,7 +914,7 @@ public string Namespace { get; set; }
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#namespace DataVaultKvSecretSubkeysV2#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#namespace DataVaultKvSecretSubkeysV2#namespace}
---
@@ -928,7 +928,7 @@ public double Version { get; set; }
Specifies the version to return. If not set the latest version is returned.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#version DataVaultKvSecretSubkeysV2#version}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#version DataVaultKvSecretSubkeysV2#version}
---
diff --git a/docs/dataVaultKvSecretSubkeysV2.go.md b/docs/dataVaultKvSecretSubkeysV2.go.md
index 7a560648..0fa8dd25 100644
--- a/docs/dataVaultKvSecretSubkeysV2.go.md
+++ b/docs/dataVaultKvSecretSubkeysV2.go.md
@@ -4,7 +4,7 @@
### DataVaultKvSecretSubkeysV2
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2 vault_kv_secret_subkeys_v2}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2 vault_kv_secret_subkeys_v2}.
#### Initializers
@@ -393,7 +393,7 @@ The construct id used in the generated config for the DataVaultKvSecretSubkeysV2
The id of the existing DataVaultKvSecretSubkeysV2 that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#import import section} in the documentation of this resource for the id to use
---
@@ -769,7 +769,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultkvsecretsubk
| Mount
| *string
| Path where KV-V2 engine is mounted. |
| Name
| *string
| Full name of the secret. |
| Depth
| *f64
| Specifies the deepest nesting level to provide in the output.If non-zero, keys that reside at the specified depth value will be artificially treated as leaves and will thus be 'null' even if further underlying sub-keys exist. |
-| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#id DataVaultKvSecretSubkeysV2#id}. |
+| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#id DataVaultKvSecretSubkeysV2#id}. |
| Namespace
| *string
| Target namespace. (requires Enterprise). |
| Version
| *f64
| Specifies the version to return. If not set the latest version is returned. |
@@ -855,7 +855,7 @@ Mount *string
Path where KV-V2 engine is mounted.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#mount DataVaultKvSecretSubkeysV2#mount}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#mount DataVaultKvSecretSubkeysV2#mount}
---
@@ -871,7 +871,7 @@ Full name of the secret.
For a nested secret, the name is the nested path excluding the mount and data prefix. For example, for a secret at 'kvv2/data/foo/bar/baz', the name is 'foo/bar/baz'
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#name DataVaultKvSecretSubkeysV2#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#name DataVaultKvSecretSubkeysV2#name}
---
@@ -885,7 +885,7 @@ Depth *f64
Specifies the deepest nesting level to provide in the output.If non-zero, keys that reside at the specified depth value will be artificially treated as leaves and will thus be 'null' even if further underlying sub-keys exist.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#depth DataVaultKvSecretSubkeysV2#depth}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#depth DataVaultKvSecretSubkeysV2#depth}
---
@@ -897,7 +897,7 @@ Id *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#id DataVaultKvSecretSubkeysV2#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#id DataVaultKvSecretSubkeysV2#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -914,7 +914,7 @@ Namespace *string
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#namespace DataVaultKvSecretSubkeysV2#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#namespace DataVaultKvSecretSubkeysV2#namespace}
---
@@ -928,7 +928,7 @@ Version *f64
Specifies the version to return. If not set the latest version is returned.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#version DataVaultKvSecretSubkeysV2#version}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#version DataVaultKvSecretSubkeysV2#version}
---
diff --git a/docs/dataVaultKvSecretSubkeysV2.java.md b/docs/dataVaultKvSecretSubkeysV2.java.md
index 0fe73c0d..fca4bfb7 100644
--- a/docs/dataVaultKvSecretSubkeysV2.java.md
+++ b/docs/dataVaultKvSecretSubkeysV2.java.md
@@ -4,7 +4,7 @@
### DataVaultKvSecretSubkeysV2
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2 vault_kv_secret_subkeys_v2}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2 vault_kv_secret_subkeys_v2}.
#### Initializers
@@ -46,7 +46,7 @@ DataVaultKvSecretSubkeysV2.Builder.create(Construct scope, java.lang.String id)
| mount
| java.lang.String
| Path where KV-V2 engine is mounted. |
| name
| java.lang.String
| Full name of the secret. |
| depth
| java.lang.Number
| Specifies the deepest nesting level to provide in the output.If non-zero, keys that reside at the specified depth value will be artificially treated as leaves and will thus be 'null' even if further underlying sub-keys exist. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#id DataVaultKvSecretSubkeysV2#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#id DataVaultKvSecretSubkeysV2#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
| version
| java.lang.Number
| Specifies the version to return. If not set the latest version is returned. |
@@ -118,7 +118,7 @@ Must be unique amongst siblings in the same scope
Path where KV-V2 engine is mounted.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#mount DataVaultKvSecretSubkeysV2#mount}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#mount DataVaultKvSecretSubkeysV2#mount}
---
@@ -130,7 +130,7 @@ Full name of the secret.
For a nested secret, the name is the nested path excluding the mount and data prefix. For example, for a secret at 'kvv2/data/foo/bar/baz', the name is 'foo/bar/baz'
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#name DataVaultKvSecretSubkeysV2#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#name DataVaultKvSecretSubkeysV2#name}
---
@@ -140,7 +140,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Specifies the deepest nesting level to provide in the output.If non-zero, keys that reside at the specified depth value will be artificially treated as leaves and will thus be 'null' even if further underlying sub-keys exist.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#depth DataVaultKvSecretSubkeysV2#depth}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#depth DataVaultKvSecretSubkeysV2#depth}
---
@@ -148,7 +148,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#id DataVaultKvSecretSubkeysV2#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#id DataVaultKvSecretSubkeysV2#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -161,7 +161,7 @@ If you experience problems setting this value it might not be settable. Please t
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#namespace DataVaultKvSecretSubkeysV2#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#namespace DataVaultKvSecretSubkeysV2#namespace}
---
@@ -171,7 +171,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Specifies the version to return. If not set the latest version is returned.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#version DataVaultKvSecretSubkeysV2#version}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#version DataVaultKvSecretSubkeysV2#version}
---
@@ -522,7 +522,7 @@ The construct id used in the generated config for the DataVaultKvSecretSubkeysV2
The id of the existing DataVaultKvSecretSubkeysV2 that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#import import section} in the documentation of this resource for the id to use
---
@@ -902,7 +902,7 @@ DataVaultKvSecretSubkeysV2Config.builder()
| mount
| java.lang.String
| Path where KV-V2 engine is mounted. |
| name
| java.lang.String
| Full name of the secret. |
| depth
| java.lang.Number
| Specifies the deepest nesting level to provide in the output.If non-zero, keys that reside at the specified depth value will be artificially treated as leaves and will thus be 'null' even if further underlying sub-keys exist. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#id DataVaultKvSecretSubkeysV2#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#id DataVaultKvSecretSubkeysV2#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
| version
| java.lang.Number
| Specifies the version to return. If not set the latest version is returned. |
@@ -988,7 +988,7 @@ public java.lang.String getMount();
Path where KV-V2 engine is mounted.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#mount DataVaultKvSecretSubkeysV2#mount}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#mount DataVaultKvSecretSubkeysV2#mount}
---
@@ -1004,7 +1004,7 @@ Full name of the secret.
For a nested secret, the name is the nested path excluding the mount and data prefix. For example, for a secret at 'kvv2/data/foo/bar/baz', the name is 'foo/bar/baz'
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#name DataVaultKvSecretSubkeysV2#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#name DataVaultKvSecretSubkeysV2#name}
---
@@ -1018,7 +1018,7 @@ public java.lang.Number getDepth();
Specifies the deepest nesting level to provide in the output.If non-zero, keys that reside at the specified depth value will be artificially treated as leaves and will thus be 'null' even if further underlying sub-keys exist.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#depth DataVaultKvSecretSubkeysV2#depth}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#depth DataVaultKvSecretSubkeysV2#depth}
---
@@ -1030,7 +1030,7 @@ public java.lang.String getId();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#id DataVaultKvSecretSubkeysV2#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#id DataVaultKvSecretSubkeysV2#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1047,7 +1047,7 @@ public java.lang.String getNamespace();
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#namespace DataVaultKvSecretSubkeysV2#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#namespace DataVaultKvSecretSubkeysV2#namespace}
---
@@ -1061,7 +1061,7 @@ public java.lang.Number getVersion();
Specifies the version to return. If not set the latest version is returned.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#version DataVaultKvSecretSubkeysV2#version}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#version DataVaultKvSecretSubkeysV2#version}
---
diff --git a/docs/dataVaultKvSecretSubkeysV2.python.md b/docs/dataVaultKvSecretSubkeysV2.python.md
index 0d924815..9ed80256 100644
--- a/docs/dataVaultKvSecretSubkeysV2.python.md
+++ b/docs/dataVaultKvSecretSubkeysV2.python.md
@@ -4,7 +4,7 @@
### DataVaultKvSecretSubkeysV2
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2 vault_kv_secret_subkeys_v2}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2 vault_kv_secret_subkeys_v2}.
#### Initializers
@@ -44,7 +44,7 @@ dataVaultKvSecretSubkeysV2.DataVaultKvSecretSubkeysV2(
| mount
| str
| Path where KV-V2 engine is mounted. |
| name
| str
| Full name of the secret. |
| depth
| typing.Union[int, float]
| Specifies the deepest nesting level to provide in the output.If non-zero, keys that reside at the specified depth value will be artificially treated as leaves and will thus be 'null' even if further underlying sub-keys exist. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#id DataVaultKvSecretSubkeysV2#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#id DataVaultKvSecretSubkeysV2#id}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
| version
| typing.Union[int, float]
| Specifies the version to return. If not set the latest version is returned. |
@@ -116,7 +116,7 @@ Must be unique amongst siblings in the same scope
Path where KV-V2 engine is mounted.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#mount DataVaultKvSecretSubkeysV2#mount}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#mount DataVaultKvSecretSubkeysV2#mount}
---
@@ -128,7 +128,7 @@ Full name of the secret.
For a nested secret, the name is the nested path excluding the mount and data prefix. For example, for a secret at 'kvv2/data/foo/bar/baz', the name is 'foo/bar/baz'
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#name DataVaultKvSecretSubkeysV2#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#name DataVaultKvSecretSubkeysV2#name}
---
@@ -138,7 +138,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Specifies the deepest nesting level to provide in the output.If non-zero, keys that reside at the specified depth value will be artificially treated as leaves and will thus be 'null' even if further underlying sub-keys exist.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#depth DataVaultKvSecretSubkeysV2#depth}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#depth DataVaultKvSecretSubkeysV2#depth}
---
@@ -146,7 +146,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#id DataVaultKvSecretSubkeysV2#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#id DataVaultKvSecretSubkeysV2#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -159,7 +159,7 @@ If you experience problems setting this value it might not be settable. Please t
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#namespace DataVaultKvSecretSubkeysV2#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#namespace DataVaultKvSecretSubkeysV2#namespace}
---
@@ -169,7 +169,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Specifies the version to return. If not set the latest version is returned.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#version DataVaultKvSecretSubkeysV2#version}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#version DataVaultKvSecretSubkeysV2#version}
---
@@ -556,7 +556,7 @@ The construct id used in the generated config for the DataVaultKvSecretSubkeysV2
The id of the existing DataVaultKvSecretSubkeysV2 that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#import import section} in the documentation of this resource for the id to use
---
@@ -932,7 +932,7 @@ dataVaultKvSecretSubkeysV2.DataVaultKvSecretSubkeysV2Config(
| mount
| str
| Path where KV-V2 engine is mounted. |
| name
| str
| Full name of the secret. |
| depth
| typing.Union[int, float]
| Specifies the deepest nesting level to provide in the output.If non-zero, keys that reside at the specified depth value will be artificially treated as leaves and will thus be 'null' even if further underlying sub-keys exist. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#id DataVaultKvSecretSubkeysV2#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#id DataVaultKvSecretSubkeysV2#id}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
| version
| typing.Union[int, float]
| Specifies the version to return. If not set the latest version is returned. |
@@ -1018,7 +1018,7 @@ mount: str
Path where KV-V2 engine is mounted.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#mount DataVaultKvSecretSubkeysV2#mount}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#mount DataVaultKvSecretSubkeysV2#mount}
---
@@ -1034,7 +1034,7 @@ Full name of the secret.
For a nested secret, the name is the nested path excluding the mount and data prefix. For example, for a secret at 'kvv2/data/foo/bar/baz', the name is 'foo/bar/baz'
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#name DataVaultKvSecretSubkeysV2#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#name DataVaultKvSecretSubkeysV2#name}
---
@@ -1048,7 +1048,7 @@ depth: typing.Union[int, float]
Specifies the deepest nesting level to provide in the output.If non-zero, keys that reside at the specified depth value will be artificially treated as leaves and will thus be 'null' even if further underlying sub-keys exist.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#depth DataVaultKvSecretSubkeysV2#depth}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#depth DataVaultKvSecretSubkeysV2#depth}
---
@@ -1060,7 +1060,7 @@ id: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#id DataVaultKvSecretSubkeysV2#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#id DataVaultKvSecretSubkeysV2#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1077,7 +1077,7 @@ namespace: str
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#namespace DataVaultKvSecretSubkeysV2#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#namespace DataVaultKvSecretSubkeysV2#namespace}
---
@@ -1091,7 +1091,7 @@ version: typing.Union[int, float]
Specifies the version to return. If not set the latest version is returned.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#version DataVaultKvSecretSubkeysV2#version}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#version DataVaultKvSecretSubkeysV2#version}
---
diff --git a/docs/dataVaultKvSecretSubkeysV2.typescript.md b/docs/dataVaultKvSecretSubkeysV2.typescript.md
index bc79e577..f6851661 100644
--- a/docs/dataVaultKvSecretSubkeysV2.typescript.md
+++ b/docs/dataVaultKvSecretSubkeysV2.typescript.md
@@ -4,7 +4,7 @@
### DataVaultKvSecretSubkeysV2
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2 vault_kv_secret_subkeys_v2}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2 vault_kv_secret_subkeys_v2}.
#### Initializers
@@ -393,7 +393,7 @@ The construct id used in the generated config for the DataVaultKvSecretSubkeysV2
The id of the existing DataVaultKvSecretSubkeysV2 that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#import import section} in the documentation of this resource for the id to use
---
@@ -755,7 +755,7 @@ const dataVaultKvSecretSubkeysV2Config: dataVaultKvSecretSubkeysV2.DataVaultKvSe
| mount
| string
| Path where KV-V2 engine is mounted. |
| name
| string
| Full name of the secret. |
| depth
| number
| Specifies the deepest nesting level to provide in the output.If non-zero, keys that reside at the specified depth value will be artificially treated as leaves and will thus be 'null' even if further underlying sub-keys exist. |
-| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#id DataVaultKvSecretSubkeysV2#id}. |
+| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#id DataVaultKvSecretSubkeysV2#id}. |
| namespace
| string
| Target namespace. (requires Enterprise). |
| version
| number
| Specifies the version to return. If not set the latest version is returned. |
@@ -841,7 +841,7 @@ public readonly mount: string;
Path where KV-V2 engine is mounted.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#mount DataVaultKvSecretSubkeysV2#mount}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#mount DataVaultKvSecretSubkeysV2#mount}
---
@@ -857,7 +857,7 @@ Full name of the secret.
For a nested secret, the name is the nested path excluding the mount and data prefix. For example, for a secret at 'kvv2/data/foo/bar/baz', the name is 'foo/bar/baz'
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#name DataVaultKvSecretSubkeysV2#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#name DataVaultKvSecretSubkeysV2#name}
---
@@ -871,7 +871,7 @@ public readonly depth: number;
Specifies the deepest nesting level to provide in the output.If non-zero, keys that reside at the specified depth value will be artificially treated as leaves and will thus be 'null' even if further underlying sub-keys exist.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#depth DataVaultKvSecretSubkeysV2#depth}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#depth DataVaultKvSecretSubkeysV2#depth}
---
@@ -883,7 +883,7 @@ public readonly id: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#id DataVaultKvSecretSubkeysV2#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#id DataVaultKvSecretSubkeysV2#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -900,7 +900,7 @@ public readonly namespace: string;
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#namespace DataVaultKvSecretSubkeysV2#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#namespace DataVaultKvSecretSubkeysV2#namespace}
---
@@ -914,7 +914,7 @@ public readonly version: number;
Specifies the version to return. If not set the latest version is returned.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#version DataVaultKvSecretSubkeysV2#version}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#version DataVaultKvSecretSubkeysV2#version}
---
diff --git a/docs/dataVaultKvSecretV2.csharp.md b/docs/dataVaultKvSecretV2.csharp.md
index 5e57a8c7..ef94787a 100644
--- a/docs/dataVaultKvSecretV2.csharp.md
+++ b/docs/dataVaultKvSecretV2.csharp.md
@@ -4,7 +4,7 @@
### DataVaultKvSecretV2
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_v2 vault_kv_secret_v2}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_v2 vault_kv_secret_v2}.
#### Initializers
@@ -386,7 +386,7 @@ The construct id used in the generated config for the DataVaultKvSecretV2 to imp
The id of the existing DataVaultKvSecretV2 that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_v2#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_v2#import import section} in the documentation of this resource for the id to use
---
@@ -782,7 +782,7 @@ new DataVaultKvSecretV2Config {
| Provisioners
| object[]
| *No description.* |
| Mount
| string
| Path where KV-V2 engine is mounted. |
| Name
| string
| Full name of the secret. |
-| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_v2#id DataVaultKvSecretV2#id}. |
+| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_v2#id DataVaultKvSecretV2#id}. |
| Namespace
| string
| Target namespace. (requires Enterprise). |
| Version
| double
| Version of the secret to retrieve. |
@@ -868,7 +868,7 @@ public string Mount { get; set; }
Path where KV-V2 engine is mounted.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_v2#mount DataVaultKvSecretV2#mount}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_v2#mount DataVaultKvSecretV2#mount}
---
@@ -884,7 +884,7 @@ Full name of the secret.
For a nested secret, the name is the nested path excluding the mount and data prefix. For example, for a secret at 'kvv2/data/foo/bar/baz', the name is 'foo/bar/baz'
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_v2#name DataVaultKvSecretV2#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_v2#name DataVaultKvSecretV2#name}
---
@@ -896,7 +896,7 @@ public string Id { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_v2#id DataVaultKvSecretV2#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_v2#id DataVaultKvSecretV2#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -913,7 +913,7 @@ public string Namespace { get; set; }
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_v2#namespace DataVaultKvSecretV2#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_v2#namespace DataVaultKvSecretV2#namespace}
---
@@ -927,7 +927,7 @@ public double Version { get; set; }
Version of the secret to retrieve.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_v2#version DataVaultKvSecretV2#version}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_v2#version DataVaultKvSecretV2#version}
---
diff --git a/docs/dataVaultKvSecretV2.go.md b/docs/dataVaultKvSecretV2.go.md
index e5882900..b6653ffc 100644
--- a/docs/dataVaultKvSecretV2.go.md
+++ b/docs/dataVaultKvSecretV2.go.md
@@ -4,7 +4,7 @@
### DataVaultKvSecretV2
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_v2 vault_kv_secret_v2}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_v2 vault_kv_secret_v2}.
#### Initializers
@@ -386,7 +386,7 @@ The construct id used in the generated config for the DataVaultKvSecretV2 to imp
The id of the existing DataVaultKvSecretV2 that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_v2#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_v2#import import section} in the documentation of this resource for the id to use
---
@@ -782,7 +782,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultkvsecretv2"
| Provisioners
| *[]interface{}
| *No description.* |
| Mount
| *string
| Path where KV-V2 engine is mounted. |
| Name
| *string
| Full name of the secret. |
-| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_v2#id DataVaultKvSecretV2#id}. |
+| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_v2#id DataVaultKvSecretV2#id}. |
| Namespace
| *string
| Target namespace. (requires Enterprise). |
| Version
| *f64
| Version of the secret to retrieve. |
@@ -868,7 +868,7 @@ Mount *string
Path where KV-V2 engine is mounted.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_v2#mount DataVaultKvSecretV2#mount}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_v2#mount DataVaultKvSecretV2#mount}
---
@@ -884,7 +884,7 @@ Full name of the secret.
For a nested secret, the name is the nested path excluding the mount and data prefix. For example, for a secret at 'kvv2/data/foo/bar/baz', the name is 'foo/bar/baz'
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_v2#name DataVaultKvSecretV2#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_v2#name DataVaultKvSecretV2#name}
---
@@ -896,7 +896,7 @@ Id *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_v2#id DataVaultKvSecretV2#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_v2#id DataVaultKvSecretV2#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -913,7 +913,7 @@ Namespace *string
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_v2#namespace DataVaultKvSecretV2#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_v2#namespace DataVaultKvSecretV2#namespace}
---
@@ -927,7 +927,7 @@ Version *f64
Version of the secret to retrieve.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_v2#version DataVaultKvSecretV2#version}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_v2#version DataVaultKvSecretV2#version}
---
diff --git a/docs/dataVaultKvSecretV2.java.md b/docs/dataVaultKvSecretV2.java.md
index 5e816791..86a42285 100644
--- a/docs/dataVaultKvSecretV2.java.md
+++ b/docs/dataVaultKvSecretV2.java.md
@@ -4,7 +4,7 @@
### DataVaultKvSecretV2
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_v2 vault_kv_secret_v2}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_v2 vault_kv_secret_v2}.
#### Initializers
@@ -44,7 +44,7 @@ DataVaultKvSecretV2.Builder.create(Construct scope, java.lang.String id)
| provisioners
| java.util.List
| *No description.* |
| mount
| java.lang.String
| Path where KV-V2 engine is mounted. |
| name
| java.lang.String
| Full name of the secret. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_v2#id DataVaultKvSecretV2#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_v2#id DataVaultKvSecretV2#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
| version
| java.lang.Number
| Version of the secret to retrieve. |
@@ -116,7 +116,7 @@ Must be unique amongst siblings in the same scope
Path where KV-V2 engine is mounted.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_v2#mount DataVaultKvSecretV2#mount}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_v2#mount DataVaultKvSecretV2#mount}
---
@@ -128,7 +128,7 @@ Full name of the secret.
For a nested secret, the name is the nested path excluding the mount and data prefix. For example, for a secret at 'kvv2/data/foo/bar/baz', the name is 'foo/bar/baz'
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_v2#name DataVaultKvSecretV2#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_v2#name DataVaultKvSecretV2#name}
---
@@ -136,7 +136,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_v2#id DataVaultKvSecretV2#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_v2#id DataVaultKvSecretV2#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -149,7 +149,7 @@ If you experience problems setting this value it might not be settable. Please t
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_v2#namespace DataVaultKvSecretV2#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_v2#namespace DataVaultKvSecretV2#namespace}
---
@@ -159,7 +159,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Version of the secret to retrieve.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_v2#version DataVaultKvSecretV2#version}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_v2#version DataVaultKvSecretV2#version}
---
@@ -503,7 +503,7 @@ The construct id used in the generated config for the DataVaultKvSecretV2 to imp
The id of the existing DataVaultKvSecretV2 that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_v2#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_v2#import import section} in the documentation of this resource for the id to use
---
@@ -903,7 +903,7 @@ DataVaultKvSecretV2Config.builder()
| provisioners
| java.util.List
| *No description.* |
| mount
| java.lang.String
| Path where KV-V2 engine is mounted. |
| name
| java.lang.String
| Full name of the secret. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_v2#id DataVaultKvSecretV2#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_v2#id DataVaultKvSecretV2#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
| version
| java.lang.Number
| Version of the secret to retrieve. |
@@ -989,7 +989,7 @@ public java.lang.String getMount();
Path where KV-V2 engine is mounted.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_v2#mount DataVaultKvSecretV2#mount}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_v2#mount DataVaultKvSecretV2#mount}
---
@@ -1005,7 +1005,7 @@ Full name of the secret.
For a nested secret, the name is the nested path excluding the mount and data prefix. For example, for a secret at 'kvv2/data/foo/bar/baz', the name is 'foo/bar/baz'
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_v2#name DataVaultKvSecretV2#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_v2#name DataVaultKvSecretV2#name}
---
@@ -1017,7 +1017,7 @@ public java.lang.String getId();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_v2#id DataVaultKvSecretV2#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_v2#id DataVaultKvSecretV2#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1034,7 +1034,7 @@ public java.lang.String getNamespace();
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_v2#namespace DataVaultKvSecretV2#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_v2#namespace DataVaultKvSecretV2#namespace}
---
@@ -1048,7 +1048,7 @@ public java.lang.Number getVersion();
Version of the secret to retrieve.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_v2#version DataVaultKvSecretV2#version}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_v2#version DataVaultKvSecretV2#version}
---
diff --git a/docs/dataVaultKvSecretV2.python.md b/docs/dataVaultKvSecretV2.python.md
index bf98c5b6..8996da1c 100644
--- a/docs/dataVaultKvSecretV2.python.md
+++ b/docs/dataVaultKvSecretV2.python.md
@@ -4,7 +4,7 @@
### DataVaultKvSecretV2
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_v2 vault_kv_secret_v2}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_v2 vault_kv_secret_v2}.
#### Initializers
@@ -42,7 +42,7 @@ dataVaultKvSecretV2.DataVaultKvSecretV2(
| provisioners
| typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]]
| *No description.* |
| mount
| str
| Path where KV-V2 engine is mounted. |
| name
| str
| Full name of the secret. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_v2#id DataVaultKvSecretV2#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_v2#id DataVaultKvSecretV2#id}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
| version
| typing.Union[int, float]
| Version of the secret to retrieve. |
@@ -114,7 +114,7 @@ Must be unique amongst siblings in the same scope
Path where KV-V2 engine is mounted.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_v2#mount DataVaultKvSecretV2#mount}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_v2#mount DataVaultKvSecretV2#mount}
---
@@ -126,7 +126,7 @@ Full name of the secret.
For a nested secret, the name is the nested path excluding the mount and data prefix. For example, for a secret at 'kvv2/data/foo/bar/baz', the name is 'foo/bar/baz'
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_v2#name DataVaultKvSecretV2#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_v2#name DataVaultKvSecretV2#name}
---
@@ -134,7 +134,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_v2#id DataVaultKvSecretV2#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_v2#id DataVaultKvSecretV2#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -147,7 +147,7 @@ If you experience problems setting this value it might not be settable. Please t
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_v2#namespace DataVaultKvSecretV2#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_v2#namespace DataVaultKvSecretV2#namespace}
---
@@ -157,7 +157,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Version of the secret to retrieve.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_v2#version DataVaultKvSecretV2#version}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_v2#version DataVaultKvSecretV2#version}
---
@@ -537,7 +537,7 @@ The construct id used in the generated config for the DataVaultKvSecretV2 to imp
The id of the existing DataVaultKvSecretV2 that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_v2#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_v2#import import section} in the documentation of this resource for the id to use
---
@@ -933,7 +933,7 @@ dataVaultKvSecretV2.DataVaultKvSecretV2Config(
| provisioners
| typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]]
| *No description.* |
| mount
| str
| Path where KV-V2 engine is mounted. |
| name
| str
| Full name of the secret. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_v2#id DataVaultKvSecretV2#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_v2#id DataVaultKvSecretV2#id}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
| version
| typing.Union[int, float]
| Version of the secret to retrieve. |
@@ -1019,7 +1019,7 @@ mount: str
Path where KV-V2 engine is mounted.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_v2#mount DataVaultKvSecretV2#mount}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_v2#mount DataVaultKvSecretV2#mount}
---
@@ -1035,7 +1035,7 @@ Full name of the secret.
For a nested secret, the name is the nested path excluding the mount and data prefix. For example, for a secret at 'kvv2/data/foo/bar/baz', the name is 'foo/bar/baz'
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_v2#name DataVaultKvSecretV2#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_v2#name DataVaultKvSecretV2#name}
---
@@ -1047,7 +1047,7 @@ id: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_v2#id DataVaultKvSecretV2#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_v2#id DataVaultKvSecretV2#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1064,7 +1064,7 @@ namespace: str
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_v2#namespace DataVaultKvSecretV2#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_v2#namespace DataVaultKvSecretV2#namespace}
---
@@ -1078,7 +1078,7 @@ version: typing.Union[int, float]
Version of the secret to retrieve.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_v2#version DataVaultKvSecretV2#version}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_v2#version DataVaultKvSecretV2#version}
---
diff --git a/docs/dataVaultKvSecretV2.typescript.md b/docs/dataVaultKvSecretV2.typescript.md
index 56f9c08c..7a6afca3 100644
--- a/docs/dataVaultKvSecretV2.typescript.md
+++ b/docs/dataVaultKvSecretV2.typescript.md
@@ -4,7 +4,7 @@
### DataVaultKvSecretV2
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_v2 vault_kv_secret_v2}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_v2 vault_kv_secret_v2}.
#### Initializers
@@ -386,7 +386,7 @@ The construct id used in the generated config for the DataVaultKvSecretV2 to imp
The id of the existing DataVaultKvSecretV2 that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_v2#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_v2#import import section} in the documentation of this resource for the id to use
---
@@ -769,7 +769,7 @@ const dataVaultKvSecretV2Config: dataVaultKvSecretV2.DataVaultKvSecretV2Config =
| provisioners
| cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[]
| *No description.* |
| mount
| string
| Path where KV-V2 engine is mounted. |
| name
| string
| Full name of the secret. |
-| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_v2#id DataVaultKvSecretV2#id}. |
+| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_v2#id DataVaultKvSecretV2#id}. |
| namespace
| string
| Target namespace. (requires Enterprise). |
| version
| number
| Version of the secret to retrieve. |
@@ -855,7 +855,7 @@ public readonly mount: string;
Path where KV-V2 engine is mounted.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_v2#mount DataVaultKvSecretV2#mount}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_v2#mount DataVaultKvSecretV2#mount}
---
@@ -871,7 +871,7 @@ Full name of the secret.
For a nested secret, the name is the nested path excluding the mount and data prefix. For example, for a secret at 'kvv2/data/foo/bar/baz', the name is 'foo/bar/baz'
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_v2#name DataVaultKvSecretV2#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_v2#name DataVaultKvSecretV2#name}
---
@@ -883,7 +883,7 @@ public readonly id: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_v2#id DataVaultKvSecretV2#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_v2#id DataVaultKvSecretV2#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -900,7 +900,7 @@ public readonly namespace: string;
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_v2#namespace DataVaultKvSecretV2#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_v2#namespace DataVaultKvSecretV2#namespace}
---
@@ -914,7 +914,7 @@ public readonly version: number;
Version of the secret to retrieve.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_v2#version DataVaultKvSecretV2#version}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_v2#version DataVaultKvSecretV2#version}
---
diff --git a/docs/dataVaultKvSecretsList.csharp.md b/docs/dataVaultKvSecretsList.csharp.md
index 74aff140..2491fb75 100644
--- a/docs/dataVaultKvSecretsList.csharp.md
+++ b/docs/dataVaultKvSecretsList.csharp.md
@@ -4,7 +4,7 @@
### DataVaultKvSecretsList
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list vault_kv_secrets_list}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list vault_kv_secrets_list}.
#### Initializers
@@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultKvSecretsList to
The id of the existing DataVaultKvSecretsList that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list#import import section} in the documentation of this resource for the id to use
---
@@ -662,7 +662,7 @@ new DataVaultKvSecretsListConfig {
| Provider
| HashiCorp.Cdktf.TerraformProvider
| *No description.* |
| Provisioners
| object[]
| *No description.* |
| Path
| string
| Full KV-V1 path where secrets will be listed. |
-| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list#id DataVaultKvSecretsList#id}. |
+| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list#id DataVaultKvSecretsList#id}. |
| Namespace
| string
| Target namespace. (requires Enterprise). |
---
@@ -747,7 +747,7 @@ public string Path { get; set; }
Full KV-V1 path where secrets will be listed.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list#path DataVaultKvSecretsList#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list#path DataVaultKvSecretsList#path}
---
@@ -759,7 +759,7 @@ public string Id { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list#id DataVaultKvSecretsList#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list#id DataVaultKvSecretsList#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -776,7 +776,7 @@ public string Namespace { get; set; }
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list#namespace DataVaultKvSecretsList#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list#namespace DataVaultKvSecretsList#namespace}
---
diff --git a/docs/dataVaultKvSecretsList.go.md b/docs/dataVaultKvSecretsList.go.md
index c60ba195..3969357e 100644
--- a/docs/dataVaultKvSecretsList.go.md
+++ b/docs/dataVaultKvSecretsList.go.md
@@ -4,7 +4,7 @@
### DataVaultKvSecretsList
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list vault_kv_secrets_list}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list vault_kv_secrets_list}.
#### Initializers
@@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultKvSecretsList to
The id of the existing DataVaultKvSecretsList that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list#import import section} in the documentation of this resource for the id to use
---
@@ -662,7 +662,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultkvsecretslis
| Provider
| github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProvider
| *No description.* |
| Provisioners
| *[]interface{}
| *No description.* |
| Path
| *string
| Full KV-V1 path where secrets will be listed. |
-| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list#id DataVaultKvSecretsList#id}. |
+| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list#id DataVaultKvSecretsList#id}. |
| Namespace
| *string
| Target namespace. (requires Enterprise). |
---
@@ -747,7 +747,7 @@ Path *string
Full KV-V1 path where secrets will be listed.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list#path DataVaultKvSecretsList#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list#path DataVaultKvSecretsList#path}
---
@@ -759,7 +759,7 @@ Id *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list#id DataVaultKvSecretsList#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list#id DataVaultKvSecretsList#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -776,7 +776,7 @@ Namespace *string
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list#namespace DataVaultKvSecretsList#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list#namespace DataVaultKvSecretsList#namespace}
---
diff --git a/docs/dataVaultKvSecretsList.java.md b/docs/dataVaultKvSecretsList.java.md
index a4d83cdb..8f35c3e6 100644
--- a/docs/dataVaultKvSecretsList.java.md
+++ b/docs/dataVaultKvSecretsList.java.md
@@ -4,7 +4,7 @@
### DataVaultKvSecretsList
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list vault_kv_secrets_list}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list vault_kv_secrets_list}.
#### Initializers
@@ -41,7 +41,7 @@ DataVaultKvSecretsList.Builder.create(Construct scope, java.lang.String id)
| provider
| com.hashicorp.cdktf.TerraformProvider
| *No description.* |
| provisioners
| java.util.List
| *No description.* |
| path
| java.lang.String
| Full KV-V1 path where secrets will be listed. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list#id DataVaultKvSecretsList#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list#id DataVaultKvSecretsList#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
---
@@ -112,7 +112,7 @@ Must be unique amongst siblings in the same scope
Full KV-V1 path where secrets will be listed.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list#path DataVaultKvSecretsList#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list#path DataVaultKvSecretsList#path}
---
@@ -120,7 +120,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list#id DataVaultKvSecretsList#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list#id DataVaultKvSecretsList#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -133,7 +133,7 @@ If you experience problems setting this value it might not be settable. Please t
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list#namespace DataVaultKvSecretsList#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list#namespace DataVaultKvSecretsList#namespace}
---
@@ -470,7 +470,7 @@ The construct id used in the generated config for the DataVaultKvSecretsList to
The id of the existing DataVaultKvSecretsList that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list#import import section} in the documentation of this resource for the id to use
---
@@ -757,7 +757,7 @@ DataVaultKvSecretsListConfig.builder()
| provider
| com.hashicorp.cdktf.TerraformProvider
| *No description.* |
| provisioners
| java.util.List
| *No description.* |
| path
| java.lang.String
| Full KV-V1 path where secrets will be listed. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list#id DataVaultKvSecretsList#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list#id DataVaultKvSecretsList#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
---
@@ -842,7 +842,7 @@ public java.lang.String getPath();
Full KV-V1 path where secrets will be listed.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list#path DataVaultKvSecretsList#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list#path DataVaultKvSecretsList#path}
---
@@ -854,7 +854,7 @@ public java.lang.String getId();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list#id DataVaultKvSecretsList#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list#id DataVaultKvSecretsList#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -871,7 +871,7 @@ public java.lang.String getNamespace();
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list#namespace DataVaultKvSecretsList#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list#namespace DataVaultKvSecretsList#namespace}
---
diff --git a/docs/dataVaultKvSecretsList.python.md b/docs/dataVaultKvSecretsList.python.md
index 9d9b0e33..249788d9 100644
--- a/docs/dataVaultKvSecretsList.python.md
+++ b/docs/dataVaultKvSecretsList.python.md
@@ -4,7 +4,7 @@
### DataVaultKvSecretsList
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list vault_kv_secrets_list}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list vault_kv_secrets_list}.
#### Initializers
@@ -39,7 +39,7 @@ dataVaultKvSecretsList.DataVaultKvSecretsList(
| provider
| cdktf.TerraformProvider
| *No description.* |
| provisioners
| typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]]
| *No description.* |
| path
| str
| Full KV-V1 path where secrets will be listed. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list#id DataVaultKvSecretsList#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list#id DataVaultKvSecretsList#id}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
---
@@ -110,7 +110,7 @@ Must be unique amongst siblings in the same scope
Full KV-V1 path where secrets will be listed.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list#path DataVaultKvSecretsList#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list#path DataVaultKvSecretsList#path}
---
@@ -118,7 +118,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list#id DataVaultKvSecretsList#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list#id DataVaultKvSecretsList#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -131,7 +131,7 @@ If you experience problems setting this value it might not be settable. Please t
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list#namespace DataVaultKvSecretsList#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list#namespace DataVaultKvSecretsList#namespace}
---
@@ -504,7 +504,7 @@ The construct id used in the generated config for the DataVaultKvSecretsList to
The id of the existing DataVaultKvSecretsList that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list#import import section} in the documentation of this resource for the id to use
---
@@ -787,7 +787,7 @@ dataVaultKvSecretsList.DataVaultKvSecretsListConfig(
| provider
| cdktf.TerraformProvider
| *No description.* |
| provisioners
| typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]]
| *No description.* |
| path
| str
| Full KV-V1 path where secrets will be listed. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list#id DataVaultKvSecretsList#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list#id DataVaultKvSecretsList#id}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
---
@@ -872,7 +872,7 @@ path: str
Full KV-V1 path where secrets will be listed.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list#path DataVaultKvSecretsList#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list#path DataVaultKvSecretsList#path}
---
@@ -884,7 +884,7 @@ id: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list#id DataVaultKvSecretsList#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list#id DataVaultKvSecretsList#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -901,7 +901,7 @@ namespace: str
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list#namespace DataVaultKvSecretsList#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list#namespace DataVaultKvSecretsList#namespace}
---
diff --git a/docs/dataVaultKvSecretsList.typescript.md b/docs/dataVaultKvSecretsList.typescript.md
index de8ff841..f62cd8b9 100644
--- a/docs/dataVaultKvSecretsList.typescript.md
+++ b/docs/dataVaultKvSecretsList.typescript.md
@@ -4,7 +4,7 @@
### DataVaultKvSecretsList
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list vault_kv_secrets_list}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list vault_kv_secrets_list}.
#### Initializers
@@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultKvSecretsList to
The id of the existing DataVaultKvSecretsList that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list#import import section} in the documentation of this resource for the id to use
---
@@ -651,7 +651,7 @@ const dataVaultKvSecretsListConfig: dataVaultKvSecretsList.DataVaultKvSecretsLis
| provider
| cdktf.TerraformProvider
| *No description.* |
| provisioners
| cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[]
| *No description.* |
| path
| string
| Full KV-V1 path where secrets will be listed. |
-| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list#id DataVaultKvSecretsList#id}. |
+| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list#id DataVaultKvSecretsList#id}. |
| namespace
| string
| Target namespace. (requires Enterprise). |
---
@@ -736,7 +736,7 @@ public readonly path: string;
Full KV-V1 path where secrets will be listed.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list#path DataVaultKvSecretsList#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list#path DataVaultKvSecretsList#path}
---
@@ -748,7 +748,7 @@ public readonly id: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list#id DataVaultKvSecretsList#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list#id DataVaultKvSecretsList#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -765,7 +765,7 @@ public readonly namespace: string;
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list#namespace DataVaultKvSecretsList#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list#namespace DataVaultKvSecretsList#namespace}
---
diff --git a/docs/dataVaultKvSecretsListV2.csharp.md b/docs/dataVaultKvSecretsListV2.csharp.md
index ee9db638..425ff36a 100644
--- a/docs/dataVaultKvSecretsListV2.csharp.md
+++ b/docs/dataVaultKvSecretsListV2.csharp.md
@@ -4,7 +4,7 @@
### DataVaultKvSecretsListV2
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list_v2 vault_kv_secrets_list_v2}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list_v2 vault_kv_secrets_list_v2}.
#### Initializers
@@ -386,7 +386,7 @@ The construct id used in the generated config for the DataVaultKvSecretsListV2 t
The id of the existing DataVaultKvSecretsListV2 that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list_v2#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list_v2#import import section} in the documentation of this resource for the id to use
---
@@ -703,7 +703,7 @@ new DataVaultKvSecretsListV2Config {
| Provider
| HashiCorp.Cdktf.TerraformProvider
| *No description.* |
| Provisioners
| object[]
| *No description.* |
| Mount
| string
| Path where KV-V2 engine is mounted. |
-| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list_v2#id DataVaultKvSecretsListV2#id}. |
+| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list_v2#id DataVaultKvSecretsListV2#id}. |
| Name
| string
| Full named path of the secret. |
| Namespace
| string
| Target namespace. (requires Enterprise). |
@@ -789,7 +789,7 @@ public string Mount { get; set; }
Path where KV-V2 engine is mounted.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list_v2#mount DataVaultKvSecretsListV2#mount}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list_v2#mount DataVaultKvSecretsListV2#mount}
---
@@ -801,7 +801,7 @@ public string Id { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list_v2#id DataVaultKvSecretsListV2#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list_v2#id DataVaultKvSecretsListV2#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -820,7 +820,7 @@ Full named path of the secret.
For a nested secret, the name is the nested path excluding the mount and data prefix. For example, for a secret at 'kvv2/data/foo/bar/baz', the name is 'foo/bar/baz'
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list_v2#name DataVaultKvSecretsListV2#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list_v2#name DataVaultKvSecretsListV2#name}
---
@@ -834,7 +834,7 @@ public string Namespace { get; set; }
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list_v2#namespace DataVaultKvSecretsListV2#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list_v2#namespace DataVaultKvSecretsListV2#namespace}
---
diff --git a/docs/dataVaultKvSecretsListV2.go.md b/docs/dataVaultKvSecretsListV2.go.md
index c66e5f78..1998884f 100644
--- a/docs/dataVaultKvSecretsListV2.go.md
+++ b/docs/dataVaultKvSecretsListV2.go.md
@@ -4,7 +4,7 @@
### DataVaultKvSecretsListV2
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list_v2 vault_kv_secrets_list_v2}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list_v2 vault_kv_secrets_list_v2}.
#### Initializers
@@ -386,7 +386,7 @@ The construct id used in the generated config for the DataVaultKvSecretsListV2 t
The id of the existing DataVaultKvSecretsListV2 that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list_v2#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list_v2#import import section} in the documentation of this resource for the id to use
---
@@ -703,7 +703,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultkvsecretslis
| Provider
| github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProvider
| *No description.* |
| Provisioners
| *[]interface{}
| *No description.* |
| Mount
| *string
| Path where KV-V2 engine is mounted. |
-| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list_v2#id DataVaultKvSecretsListV2#id}. |
+| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list_v2#id DataVaultKvSecretsListV2#id}. |
| Name
| *string
| Full named path of the secret. |
| Namespace
| *string
| Target namespace. (requires Enterprise). |
@@ -789,7 +789,7 @@ Mount *string
Path where KV-V2 engine is mounted.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list_v2#mount DataVaultKvSecretsListV2#mount}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list_v2#mount DataVaultKvSecretsListV2#mount}
---
@@ -801,7 +801,7 @@ Id *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list_v2#id DataVaultKvSecretsListV2#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list_v2#id DataVaultKvSecretsListV2#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -820,7 +820,7 @@ Full named path of the secret.
For a nested secret, the name is the nested path excluding the mount and data prefix. For example, for a secret at 'kvv2/data/foo/bar/baz', the name is 'foo/bar/baz'
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list_v2#name DataVaultKvSecretsListV2#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list_v2#name DataVaultKvSecretsListV2#name}
---
@@ -834,7 +834,7 @@ Namespace *string
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list_v2#namespace DataVaultKvSecretsListV2#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list_v2#namespace DataVaultKvSecretsListV2#namespace}
---
diff --git a/docs/dataVaultKvSecretsListV2.java.md b/docs/dataVaultKvSecretsListV2.java.md
index af28605c..1ff3706f 100644
--- a/docs/dataVaultKvSecretsListV2.java.md
+++ b/docs/dataVaultKvSecretsListV2.java.md
@@ -4,7 +4,7 @@
### DataVaultKvSecretsListV2
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list_v2 vault_kv_secrets_list_v2}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list_v2 vault_kv_secrets_list_v2}.
#### Initializers
@@ -42,7 +42,7 @@ DataVaultKvSecretsListV2.Builder.create(Construct scope, java.lang.String id)
| provider
| com.hashicorp.cdktf.TerraformProvider
| *No description.* |
| provisioners
| java.util.List
| *No description.* |
| mount
| java.lang.String
| Path where KV-V2 engine is mounted. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list_v2#id DataVaultKvSecretsListV2#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list_v2#id DataVaultKvSecretsListV2#id}. |
| name
| java.lang.String
| Full named path of the secret. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
@@ -114,7 +114,7 @@ Must be unique amongst siblings in the same scope
Path where KV-V2 engine is mounted.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list_v2#mount DataVaultKvSecretsListV2#mount}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list_v2#mount DataVaultKvSecretsListV2#mount}
---
@@ -122,7 +122,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list_v2#id DataVaultKvSecretsListV2#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list_v2#id DataVaultKvSecretsListV2#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -137,7 +137,7 @@ Full named path of the secret.
For a nested secret, the name is the nested path excluding the mount and data prefix. For example, for a secret at 'kvv2/data/foo/bar/baz', the name is 'foo/bar/baz'
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list_v2#name DataVaultKvSecretsListV2#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list_v2#name DataVaultKvSecretsListV2#name}
---
@@ -147,7 +147,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list_v2#namespace DataVaultKvSecretsListV2#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list_v2#namespace DataVaultKvSecretsListV2#namespace}
---
@@ -491,7 +491,7 @@ The construct id used in the generated config for the DataVaultKvSecretsListV2 t
The id of the existing DataVaultKvSecretsListV2 that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list_v2#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list_v2#import import section} in the documentation of this resource for the id to use
---
@@ -812,7 +812,7 @@ DataVaultKvSecretsListV2Config.builder()
| provider
| com.hashicorp.cdktf.TerraformProvider
| *No description.* |
| provisioners
| java.util.List
| *No description.* |
| mount
| java.lang.String
| Path where KV-V2 engine is mounted. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list_v2#id DataVaultKvSecretsListV2#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list_v2#id DataVaultKvSecretsListV2#id}. |
| name
| java.lang.String
| Full named path of the secret. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
@@ -898,7 +898,7 @@ public java.lang.String getMount();
Path where KV-V2 engine is mounted.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list_v2#mount DataVaultKvSecretsListV2#mount}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list_v2#mount DataVaultKvSecretsListV2#mount}
---
@@ -910,7 +910,7 @@ public java.lang.String getId();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list_v2#id DataVaultKvSecretsListV2#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list_v2#id DataVaultKvSecretsListV2#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -929,7 +929,7 @@ Full named path of the secret.
For a nested secret, the name is the nested path excluding the mount and data prefix. For example, for a secret at 'kvv2/data/foo/bar/baz', the name is 'foo/bar/baz'
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list_v2#name DataVaultKvSecretsListV2#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list_v2#name DataVaultKvSecretsListV2#name}
---
@@ -943,7 +943,7 @@ public java.lang.String getNamespace();
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list_v2#namespace DataVaultKvSecretsListV2#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list_v2#namespace DataVaultKvSecretsListV2#namespace}
---
diff --git a/docs/dataVaultKvSecretsListV2.python.md b/docs/dataVaultKvSecretsListV2.python.md
index b02f585f..3abfed57 100644
--- a/docs/dataVaultKvSecretsListV2.python.md
+++ b/docs/dataVaultKvSecretsListV2.python.md
@@ -4,7 +4,7 @@
### DataVaultKvSecretsListV2
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list_v2 vault_kv_secrets_list_v2}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list_v2 vault_kv_secrets_list_v2}.
#### Initializers
@@ -40,7 +40,7 @@ dataVaultKvSecretsListV2.DataVaultKvSecretsListV2(
| provider
| cdktf.TerraformProvider
| *No description.* |
| provisioners
| typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]]
| *No description.* |
| mount
| str
| Path where KV-V2 engine is mounted. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list_v2#id DataVaultKvSecretsListV2#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list_v2#id DataVaultKvSecretsListV2#id}. |
| name
| str
| Full named path of the secret. |
| namespace
| str
| Target namespace. (requires Enterprise). |
@@ -112,7 +112,7 @@ Must be unique amongst siblings in the same scope
Path where KV-V2 engine is mounted.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list_v2#mount DataVaultKvSecretsListV2#mount}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list_v2#mount DataVaultKvSecretsListV2#mount}
---
@@ -120,7 +120,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list_v2#id DataVaultKvSecretsListV2#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list_v2#id DataVaultKvSecretsListV2#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -135,7 +135,7 @@ Full named path of the secret.
For a nested secret, the name is the nested path excluding the mount and data prefix. For example, for a secret at 'kvv2/data/foo/bar/baz', the name is 'foo/bar/baz'
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list_v2#name DataVaultKvSecretsListV2#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list_v2#name DataVaultKvSecretsListV2#name}
---
@@ -145,7 +145,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list_v2#namespace DataVaultKvSecretsListV2#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list_v2#namespace DataVaultKvSecretsListV2#namespace}
---
@@ -525,7 +525,7 @@ The construct id used in the generated config for the DataVaultKvSecretsListV2 t
The id of the existing DataVaultKvSecretsListV2 that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list_v2#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list_v2#import import section} in the documentation of this resource for the id to use
---
@@ -842,7 +842,7 @@ dataVaultKvSecretsListV2.DataVaultKvSecretsListV2Config(
| provider
| cdktf.TerraformProvider
| *No description.* |
| provisioners
| typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]]
| *No description.* |
| mount
| str
| Path where KV-V2 engine is mounted. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list_v2#id DataVaultKvSecretsListV2#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list_v2#id DataVaultKvSecretsListV2#id}. |
| name
| str
| Full named path of the secret. |
| namespace
| str
| Target namespace. (requires Enterprise). |
@@ -928,7 +928,7 @@ mount: str
Path where KV-V2 engine is mounted.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list_v2#mount DataVaultKvSecretsListV2#mount}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list_v2#mount DataVaultKvSecretsListV2#mount}
---
@@ -940,7 +940,7 @@ id: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list_v2#id DataVaultKvSecretsListV2#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list_v2#id DataVaultKvSecretsListV2#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -959,7 +959,7 @@ Full named path of the secret.
For a nested secret, the name is the nested path excluding the mount and data prefix. For example, for a secret at 'kvv2/data/foo/bar/baz', the name is 'foo/bar/baz'
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list_v2#name DataVaultKvSecretsListV2#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list_v2#name DataVaultKvSecretsListV2#name}
---
@@ -973,7 +973,7 @@ namespace: str
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list_v2#namespace DataVaultKvSecretsListV2#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list_v2#namespace DataVaultKvSecretsListV2#namespace}
---
diff --git a/docs/dataVaultKvSecretsListV2.typescript.md b/docs/dataVaultKvSecretsListV2.typescript.md
index ec2078a4..85567fb0 100644
--- a/docs/dataVaultKvSecretsListV2.typescript.md
+++ b/docs/dataVaultKvSecretsListV2.typescript.md
@@ -4,7 +4,7 @@
### DataVaultKvSecretsListV2
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list_v2 vault_kv_secrets_list_v2}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list_v2 vault_kv_secrets_list_v2}.
#### Initializers
@@ -386,7 +386,7 @@ The construct id used in the generated config for the DataVaultKvSecretsListV2 t
The id of the existing DataVaultKvSecretsListV2 that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list_v2#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list_v2#import import section} in the documentation of this resource for the id to use
---
@@ -691,7 +691,7 @@ const dataVaultKvSecretsListV2Config: dataVaultKvSecretsListV2.DataVaultKvSecret
| provider
| cdktf.TerraformProvider
| *No description.* |
| provisioners
| cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[]
| *No description.* |
| mount
| string
| Path where KV-V2 engine is mounted. |
-| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list_v2#id DataVaultKvSecretsListV2#id}. |
+| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list_v2#id DataVaultKvSecretsListV2#id}. |
| name
| string
| Full named path of the secret. |
| namespace
| string
| Target namespace. (requires Enterprise). |
@@ -777,7 +777,7 @@ public readonly mount: string;
Path where KV-V2 engine is mounted.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list_v2#mount DataVaultKvSecretsListV2#mount}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list_v2#mount DataVaultKvSecretsListV2#mount}
---
@@ -789,7 +789,7 @@ public readonly id: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list_v2#id DataVaultKvSecretsListV2#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list_v2#id DataVaultKvSecretsListV2#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -808,7 +808,7 @@ Full named path of the secret.
For a nested secret, the name is the nested path excluding the mount and data prefix. For example, for a secret at 'kvv2/data/foo/bar/baz', the name is 'foo/bar/baz'
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list_v2#name DataVaultKvSecretsListV2#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list_v2#name DataVaultKvSecretsListV2#name}
---
@@ -822,7 +822,7 @@ public readonly namespace: string;
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list_v2#namespace DataVaultKvSecretsListV2#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list_v2#namespace DataVaultKvSecretsListV2#namespace}
---
diff --git a/docs/dataVaultLdapDynamicCredentials.csharp.md b/docs/dataVaultLdapDynamicCredentials.csharp.md
index 3e6453d8..7b68060a 100644
--- a/docs/dataVaultLdapDynamicCredentials.csharp.md
+++ b/docs/dataVaultLdapDynamicCredentials.csharp.md
@@ -4,7 +4,7 @@
### DataVaultLdapDynamicCredentials
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_dynamic_credentials vault_ldap_dynamic_credentials}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_dynamic_credentials vault_ldap_dynamic_credentials}.
#### Initializers
@@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultLdapDynamicCreden
The id of the existing DataVaultLdapDynamicCredentials that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_dynamic_credentials#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_dynamic_credentials#import import section} in the documentation of this resource for the id to use
---
@@ -741,7 +741,7 @@ new DataVaultLdapDynamicCredentialsConfig {
| Provisioners
| object[]
| *No description.* |
| Mount
| string
| LDAP Secret Backend to read credentials from. |
| RoleName
| string
| Name of the role. |
-| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_dynamic_credentials#id DataVaultLdapDynamicCredentials#id}. |
+| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_dynamic_credentials#id DataVaultLdapDynamicCredentials#id}. |
| Namespace
| string
| Target namespace. (requires Enterprise). |
---
@@ -826,7 +826,7 @@ public string Mount { get; set; }
LDAP Secret Backend to read credentials from.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_dynamic_credentials#mount DataVaultLdapDynamicCredentials#mount}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_dynamic_credentials#mount DataVaultLdapDynamicCredentials#mount}
---
@@ -840,7 +840,7 @@ public string RoleName { get; set; }
Name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_dynamic_credentials#role_name DataVaultLdapDynamicCredentials#role_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_dynamic_credentials#role_name DataVaultLdapDynamicCredentials#role_name}
---
@@ -852,7 +852,7 @@ public string Id { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_dynamic_credentials#id DataVaultLdapDynamicCredentials#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_dynamic_credentials#id DataVaultLdapDynamicCredentials#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -869,7 +869,7 @@ public string Namespace { get; set; }
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_dynamic_credentials#namespace DataVaultLdapDynamicCredentials#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_dynamic_credentials#namespace DataVaultLdapDynamicCredentials#namespace}
---
diff --git a/docs/dataVaultLdapDynamicCredentials.go.md b/docs/dataVaultLdapDynamicCredentials.go.md
index e846593e..f0a627d9 100644
--- a/docs/dataVaultLdapDynamicCredentials.go.md
+++ b/docs/dataVaultLdapDynamicCredentials.go.md
@@ -4,7 +4,7 @@
### DataVaultLdapDynamicCredentials
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_dynamic_credentials vault_ldap_dynamic_credentials}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_dynamic_credentials vault_ldap_dynamic_credentials}.
#### Initializers
@@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultLdapDynamicCreden
The id of the existing DataVaultLdapDynamicCredentials that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_dynamic_credentials#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_dynamic_credentials#import import section} in the documentation of this resource for the id to use
---
@@ -741,7 +741,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultldapdynamicc
| Provisioners
| *[]interface{}
| *No description.* |
| Mount
| *string
| LDAP Secret Backend to read credentials from. |
| RoleName
| *string
| Name of the role. |
-| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_dynamic_credentials#id DataVaultLdapDynamicCredentials#id}. |
+| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_dynamic_credentials#id DataVaultLdapDynamicCredentials#id}. |
| Namespace
| *string
| Target namespace. (requires Enterprise). |
---
@@ -826,7 +826,7 @@ Mount *string
LDAP Secret Backend to read credentials from.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_dynamic_credentials#mount DataVaultLdapDynamicCredentials#mount}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_dynamic_credentials#mount DataVaultLdapDynamicCredentials#mount}
---
@@ -840,7 +840,7 @@ RoleName *string
Name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_dynamic_credentials#role_name DataVaultLdapDynamicCredentials#role_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_dynamic_credentials#role_name DataVaultLdapDynamicCredentials#role_name}
---
@@ -852,7 +852,7 @@ Id *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_dynamic_credentials#id DataVaultLdapDynamicCredentials#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_dynamic_credentials#id DataVaultLdapDynamicCredentials#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -869,7 +869,7 @@ Namespace *string
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_dynamic_credentials#namespace DataVaultLdapDynamicCredentials#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_dynamic_credentials#namespace DataVaultLdapDynamicCredentials#namespace}
---
diff --git a/docs/dataVaultLdapDynamicCredentials.java.md b/docs/dataVaultLdapDynamicCredentials.java.md
index dba17e0c..40559640 100644
--- a/docs/dataVaultLdapDynamicCredentials.java.md
+++ b/docs/dataVaultLdapDynamicCredentials.java.md
@@ -4,7 +4,7 @@
### DataVaultLdapDynamicCredentials
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_dynamic_credentials vault_ldap_dynamic_credentials}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_dynamic_credentials vault_ldap_dynamic_credentials}.
#### Initializers
@@ -43,7 +43,7 @@ DataVaultLdapDynamicCredentials.Builder.create(Construct scope, java.lang.String
| provisioners
| java.util.List
| *No description.* |
| mount
| java.lang.String
| LDAP Secret Backend to read credentials from. |
| roleName
| java.lang.String
| Name of the role. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_dynamic_credentials#id DataVaultLdapDynamicCredentials#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_dynamic_credentials#id DataVaultLdapDynamicCredentials#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
---
@@ -114,7 +114,7 @@ Must be unique amongst siblings in the same scope
LDAP Secret Backend to read credentials from.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_dynamic_credentials#mount DataVaultLdapDynamicCredentials#mount}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_dynamic_credentials#mount DataVaultLdapDynamicCredentials#mount}
---
@@ -124,7 +124,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_dynamic_credentials#role_name DataVaultLdapDynamicCredentials#role_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_dynamic_credentials#role_name DataVaultLdapDynamicCredentials#role_name}
---
@@ -132,7 +132,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_dynamic_credentials#id DataVaultLdapDynamicCredentials#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_dynamic_credentials#id DataVaultLdapDynamicCredentials#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -145,7 +145,7 @@ If you experience problems setting this value it might not be settable. Please t
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_dynamic_credentials#namespace DataVaultLdapDynamicCredentials#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_dynamic_credentials#namespace DataVaultLdapDynamicCredentials#namespace}
---
@@ -482,7 +482,7 @@ The construct id used in the generated config for the DataVaultLdapDynamicCreden
The id of the existing DataVaultLdapDynamicCredentials that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_dynamic_credentials#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_dynamic_credentials#import import section} in the documentation of this resource for the id to use
---
@@ -848,7 +848,7 @@ DataVaultLdapDynamicCredentialsConfig.builder()
| provisioners
| java.util.List
| *No description.* |
| mount
| java.lang.String
| LDAP Secret Backend to read credentials from. |
| roleName
| java.lang.String
| Name of the role. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_dynamic_credentials#id DataVaultLdapDynamicCredentials#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_dynamic_credentials#id DataVaultLdapDynamicCredentials#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
---
@@ -933,7 +933,7 @@ public java.lang.String getMount();
LDAP Secret Backend to read credentials from.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_dynamic_credentials#mount DataVaultLdapDynamicCredentials#mount}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_dynamic_credentials#mount DataVaultLdapDynamicCredentials#mount}
---
@@ -947,7 +947,7 @@ public java.lang.String getRoleName();
Name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_dynamic_credentials#role_name DataVaultLdapDynamicCredentials#role_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_dynamic_credentials#role_name DataVaultLdapDynamicCredentials#role_name}
---
@@ -959,7 +959,7 @@ public java.lang.String getId();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_dynamic_credentials#id DataVaultLdapDynamicCredentials#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_dynamic_credentials#id DataVaultLdapDynamicCredentials#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -976,7 +976,7 @@ public java.lang.String getNamespace();
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_dynamic_credentials#namespace DataVaultLdapDynamicCredentials#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_dynamic_credentials#namespace DataVaultLdapDynamicCredentials#namespace}
---
diff --git a/docs/dataVaultLdapDynamicCredentials.python.md b/docs/dataVaultLdapDynamicCredentials.python.md
index 0b13b5f6..339050a9 100644
--- a/docs/dataVaultLdapDynamicCredentials.python.md
+++ b/docs/dataVaultLdapDynamicCredentials.python.md
@@ -4,7 +4,7 @@
### DataVaultLdapDynamicCredentials
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_dynamic_credentials vault_ldap_dynamic_credentials}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_dynamic_credentials vault_ldap_dynamic_credentials}.
#### Initializers
@@ -41,7 +41,7 @@ dataVaultLdapDynamicCredentials.DataVaultLdapDynamicCredentials(
| provisioners
| typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]]
| *No description.* |
| mount
| str
| LDAP Secret Backend to read credentials from. |
| role_name
| str
| Name of the role. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_dynamic_credentials#id DataVaultLdapDynamicCredentials#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_dynamic_credentials#id DataVaultLdapDynamicCredentials#id}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
---
@@ -112,7 +112,7 @@ Must be unique amongst siblings in the same scope
LDAP Secret Backend to read credentials from.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_dynamic_credentials#mount DataVaultLdapDynamicCredentials#mount}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_dynamic_credentials#mount DataVaultLdapDynamicCredentials#mount}
---
@@ -122,7 +122,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_dynamic_credentials#role_name DataVaultLdapDynamicCredentials#role_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_dynamic_credentials#role_name DataVaultLdapDynamicCredentials#role_name}
---
@@ -130,7 +130,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_dynamic_credentials#id DataVaultLdapDynamicCredentials#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_dynamic_credentials#id DataVaultLdapDynamicCredentials#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -143,7 +143,7 @@ If you experience problems setting this value it might not be settable. Please t
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_dynamic_credentials#namespace DataVaultLdapDynamicCredentials#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_dynamic_credentials#namespace DataVaultLdapDynamicCredentials#namespace}
---
@@ -516,7 +516,7 @@ The construct id used in the generated config for the DataVaultLdapDynamicCreden
The id of the existing DataVaultLdapDynamicCredentials that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_dynamic_credentials#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_dynamic_credentials#import import section} in the documentation of this resource for the id to use
---
@@ -878,7 +878,7 @@ dataVaultLdapDynamicCredentials.DataVaultLdapDynamicCredentialsConfig(
| provisioners
| typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]]
| *No description.* |
| mount
| str
| LDAP Secret Backend to read credentials from. |
| role_name
| str
| Name of the role. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_dynamic_credentials#id DataVaultLdapDynamicCredentials#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_dynamic_credentials#id DataVaultLdapDynamicCredentials#id}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
---
@@ -963,7 +963,7 @@ mount: str
LDAP Secret Backend to read credentials from.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_dynamic_credentials#mount DataVaultLdapDynamicCredentials#mount}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_dynamic_credentials#mount DataVaultLdapDynamicCredentials#mount}
---
@@ -977,7 +977,7 @@ role_name: str
Name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_dynamic_credentials#role_name DataVaultLdapDynamicCredentials#role_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_dynamic_credentials#role_name DataVaultLdapDynamicCredentials#role_name}
---
@@ -989,7 +989,7 @@ id: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_dynamic_credentials#id DataVaultLdapDynamicCredentials#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_dynamic_credentials#id DataVaultLdapDynamicCredentials#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1006,7 +1006,7 @@ namespace: str
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_dynamic_credentials#namespace DataVaultLdapDynamicCredentials#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_dynamic_credentials#namespace DataVaultLdapDynamicCredentials#namespace}
---
diff --git a/docs/dataVaultLdapDynamicCredentials.typescript.md b/docs/dataVaultLdapDynamicCredentials.typescript.md
index 561cf6ee..b7bf0c5b 100644
--- a/docs/dataVaultLdapDynamicCredentials.typescript.md
+++ b/docs/dataVaultLdapDynamicCredentials.typescript.md
@@ -4,7 +4,7 @@
### DataVaultLdapDynamicCredentials
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_dynamic_credentials vault_ldap_dynamic_credentials}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_dynamic_credentials vault_ldap_dynamic_credentials}.
#### Initializers
@@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultLdapDynamicCreden
The id of the existing DataVaultLdapDynamicCredentials that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_dynamic_credentials#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_dynamic_credentials#import import section} in the documentation of this resource for the id to use
---
@@ -729,7 +729,7 @@ const dataVaultLdapDynamicCredentialsConfig: dataVaultLdapDynamicCredentials.Dat
| provisioners
| cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[]
| *No description.* |
| mount
| string
| LDAP Secret Backend to read credentials from. |
| roleName
| string
| Name of the role. |
-| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_dynamic_credentials#id DataVaultLdapDynamicCredentials#id}. |
+| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_dynamic_credentials#id DataVaultLdapDynamicCredentials#id}. |
| namespace
| string
| Target namespace. (requires Enterprise). |
---
@@ -814,7 +814,7 @@ public readonly mount: string;
LDAP Secret Backend to read credentials from.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_dynamic_credentials#mount DataVaultLdapDynamicCredentials#mount}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_dynamic_credentials#mount DataVaultLdapDynamicCredentials#mount}
---
@@ -828,7 +828,7 @@ public readonly roleName: string;
Name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_dynamic_credentials#role_name DataVaultLdapDynamicCredentials#role_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_dynamic_credentials#role_name DataVaultLdapDynamicCredentials#role_name}
---
@@ -840,7 +840,7 @@ public readonly id: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_dynamic_credentials#id DataVaultLdapDynamicCredentials#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_dynamic_credentials#id DataVaultLdapDynamicCredentials#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -857,7 +857,7 @@ public readonly namespace: string;
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_dynamic_credentials#namespace DataVaultLdapDynamicCredentials#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_dynamic_credentials#namespace DataVaultLdapDynamicCredentials#namespace}
---
diff --git a/docs/dataVaultLdapStaticCredentials.csharp.md b/docs/dataVaultLdapStaticCredentials.csharp.md
index 4bd18417..fabd2a6d 100644
--- a/docs/dataVaultLdapStaticCredentials.csharp.md
+++ b/docs/dataVaultLdapStaticCredentials.csharp.md
@@ -4,7 +4,7 @@
### DataVaultLdapStaticCredentials
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_static_credentials vault_ldap_static_credentials}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_static_credentials vault_ldap_static_credentials}.
#### Initializers
@@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultLdapStaticCredent
The id of the existing DataVaultLdapStaticCredentials that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_static_credentials#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_static_credentials#import import section} in the documentation of this resource for the id to use
---
@@ -752,7 +752,7 @@ new DataVaultLdapStaticCredentialsConfig {
| Provisioners
| object[]
| *No description.* |
| Mount
| string
| LDAP Secret Backend to read credentials from. |
| RoleName
| string
| Name of the role. |
-| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_static_credentials#id DataVaultLdapStaticCredentials#id}. |
+| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_static_credentials#id DataVaultLdapStaticCredentials#id}. |
| Namespace
| string
| Target namespace. (requires Enterprise). |
---
@@ -837,7 +837,7 @@ public string Mount { get; set; }
LDAP Secret Backend to read credentials from.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_static_credentials#mount DataVaultLdapStaticCredentials#mount}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_static_credentials#mount DataVaultLdapStaticCredentials#mount}
---
@@ -851,7 +851,7 @@ public string RoleName { get; set; }
Name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_static_credentials#role_name DataVaultLdapStaticCredentials#role_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_static_credentials#role_name DataVaultLdapStaticCredentials#role_name}
---
@@ -863,7 +863,7 @@ public string Id { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_static_credentials#id DataVaultLdapStaticCredentials#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_static_credentials#id DataVaultLdapStaticCredentials#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -880,7 +880,7 @@ public string Namespace { get; set; }
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_static_credentials#namespace DataVaultLdapStaticCredentials#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_static_credentials#namespace DataVaultLdapStaticCredentials#namespace}
---
diff --git a/docs/dataVaultLdapStaticCredentials.go.md b/docs/dataVaultLdapStaticCredentials.go.md
index b5d0f481..b2a0afba 100644
--- a/docs/dataVaultLdapStaticCredentials.go.md
+++ b/docs/dataVaultLdapStaticCredentials.go.md
@@ -4,7 +4,7 @@
### DataVaultLdapStaticCredentials
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_static_credentials vault_ldap_static_credentials}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_static_credentials vault_ldap_static_credentials}.
#### Initializers
@@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultLdapStaticCredent
The id of the existing DataVaultLdapStaticCredentials that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_static_credentials#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_static_credentials#import import section} in the documentation of this resource for the id to use
---
@@ -752,7 +752,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultldapstaticcr
| Provisioners
| *[]interface{}
| *No description.* |
| Mount
| *string
| LDAP Secret Backend to read credentials from. |
| RoleName
| *string
| Name of the role. |
-| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_static_credentials#id DataVaultLdapStaticCredentials#id}. |
+| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_static_credentials#id DataVaultLdapStaticCredentials#id}. |
| Namespace
| *string
| Target namespace. (requires Enterprise). |
---
@@ -837,7 +837,7 @@ Mount *string
LDAP Secret Backend to read credentials from.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_static_credentials#mount DataVaultLdapStaticCredentials#mount}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_static_credentials#mount DataVaultLdapStaticCredentials#mount}
---
@@ -851,7 +851,7 @@ RoleName *string
Name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_static_credentials#role_name DataVaultLdapStaticCredentials#role_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_static_credentials#role_name DataVaultLdapStaticCredentials#role_name}
---
@@ -863,7 +863,7 @@ Id *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_static_credentials#id DataVaultLdapStaticCredentials#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_static_credentials#id DataVaultLdapStaticCredentials#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -880,7 +880,7 @@ Namespace *string
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_static_credentials#namespace DataVaultLdapStaticCredentials#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_static_credentials#namespace DataVaultLdapStaticCredentials#namespace}
---
diff --git a/docs/dataVaultLdapStaticCredentials.java.md b/docs/dataVaultLdapStaticCredentials.java.md
index 4df8c9d3..138ecbbd 100644
--- a/docs/dataVaultLdapStaticCredentials.java.md
+++ b/docs/dataVaultLdapStaticCredentials.java.md
@@ -4,7 +4,7 @@
### DataVaultLdapStaticCredentials
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_static_credentials vault_ldap_static_credentials}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_static_credentials vault_ldap_static_credentials}.
#### Initializers
@@ -43,7 +43,7 @@ DataVaultLdapStaticCredentials.Builder.create(Construct scope, java.lang.String
| provisioners
| java.util.List
| *No description.* |
| mount
| java.lang.String
| LDAP Secret Backend to read credentials from. |
| roleName
| java.lang.String
| Name of the role. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_static_credentials#id DataVaultLdapStaticCredentials#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_static_credentials#id DataVaultLdapStaticCredentials#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
---
@@ -114,7 +114,7 @@ Must be unique amongst siblings in the same scope
LDAP Secret Backend to read credentials from.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_static_credentials#mount DataVaultLdapStaticCredentials#mount}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_static_credentials#mount DataVaultLdapStaticCredentials#mount}
---
@@ -124,7 +124,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_static_credentials#role_name DataVaultLdapStaticCredentials#role_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_static_credentials#role_name DataVaultLdapStaticCredentials#role_name}
---
@@ -132,7 +132,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_static_credentials#id DataVaultLdapStaticCredentials#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_static_credentials#id DataVaultLdapStaticCredentials#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -145,7 +145,7 @@ If you experience problems setting this value it might not be settable. Please t
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_static_credentials#namespace DataVaultLdapStaticCredentials#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_static_credentials#namespace DataVaultLdapStaticCredentials#namespace}
---
@@ -482,7 +482,7 @@ The construct id used in the generated config for the DataVaultLdapStaticCredent
The id of the existing DataVaultLdapStaticCredentials that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_static_credentials#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_static_credentials#import import section} in the documentation of this resource for the id to use
---
@@ -859,7 +859,7 @@ DataVaultLdapStaticCredentialsConfig.builder()
| provisioners
| java.util.List
| *No description.* |
| mount
| java.lang.String
| LDAP Secret Backend to read credentials from. |
| roleName
| java.lang.String
| Name of the role. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_static_credentials#id DataVaultLdapStaticCredentials#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_static_credentials#id DataVaultLdapStaticCredentials#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
---
@@ -944,7 +944,7 @@ public java.lang.String getMount();
LDAP Secret Backend to read credentials from.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_static_credentials#mount DataVaultLdapStaticCredentials#mount}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_static_credentials#mount DataVaultLdapStaticCredentials#mount}
---
@@ -958,7 +958,7 @@ public java.lang.String getRoleName();
Name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_static_credentials#role_name DataVaultLdapStaticCredentials#role_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_static_credentials#role_name DataVaultLdapStaticCredentials#role_name}
---
@@ -970,7 +970,7 @@ public java.lang.String getId();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_static_credentials#id DataVaultLdapStaticCredentials#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_static_credentials#id DataVaultLdapStaticCredentials#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -987,7 +987,7 @@ public java.lang.String getNamespace();
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_static_credentials#namespace DataVaultLdapStaticCredentials#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_static_credentials#namespace DataVaultLdapStaticCredentials#namespace}
---
diff --git a/docs/dataVaultLdapStaticCredentials.python.md b/docs/dataVaultLdapStaticCredentials.python.md
index 657f7057..a647c535 100644
--- a/docs/dataVaultLdapStaticCredentials.python.md
+++ b/docs/dataVaultLdapStaticCredentials.python.md
@@ -4,7 +4,7 @@
### DataVaultLdapStaticCredentials
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_static_credentials vault_ldap_static_credentials}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_static_credentials vault_ldap_static_credentials}.
#### Initializers
@@ -41,7 +41,7 @@ dataVaultLdapStaticCredentials.DataVaultLdapStaticCredentials(
| provisioners
| typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]]
| *No description.* |
| mount
| str
| LDAP Secret Backend to read credentials from. |
| role_name
| str
| Name of the role. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_static_credentials#id DataVaultLdapStaticCredentials#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_static_credentials#id DataVaultLdapStaticCredentials#id}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
---
@@ -112,7 +112,7 @@ Must be unique amongst siblings in the same scope
LDAP Secret Backend to read credentials from.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_static_credentials#mount DataVaultLdapStaticCredentials#mount}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_static_credentials#mount DataVaultLdapStaticCredentials#mount}
---
@@ -122,7 +122,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_static_credentials#role_name DataVaultLdapStaticCredentials#role_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_static_credentials#role_name DataVaultLdapStaticCredentials#role_name}
---
@@ -130,7 +130,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_static_credentials#id DataVaultLdapStaticCredentials#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_static_credentials#id DataVaultLdapStaticCredentials#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -143,7 +143,7 @@ If you experience problems setting this value it might not be settable. Please t
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_static_credentials#namespace DataVaultLdapStaticCredentials#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_static_credentials#namespace DataVaultLdapStaticCredentials#namespace}
---
@@ -516,7 +516,7 @@ The construct id used in the generated config for the DataVaultLdapStaticCredent
The id of the existing DataVaultLdapStaticCredentials that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_static_credentials#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_static_credentials#import import section} in the documentation of this resource for the id to use
---
@@ -889,7 +889,7 @@ dataVaultLdapStaticCredentials.DataVaultLdapStaticCredentialsConfig(
| provisioners
| typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]]
| *No description.* |
| mount
| str
| LDAP Secret Backend to read credentials from. |
| role_name
| str
| Name of the role. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_static_credentials#id DataVaultLdapStaticCredentials#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_static_credentials#id DataVaultLdapStaticCredentials#id}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
---
@@ -974,7 +974,7 @@ mount: str
LDAP Secret Backend to read credentials from.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_static_credentials#mount DataVaultLdapStaticCredentials#mount}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_static_credentials#mount DataVaultLdapStaticCredentials#mount}
---
@@ -988,7 +988,7 @@ role_name: str
Name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_static_credentials#role_name DataVaultLdapStaticCredentials#role_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_static_credentials#role_name DataVaultLdapStaticCredentials#role_name}
---
@@ -1000,7 +1000,7 @@ id: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_static_credentials#id DataVaultLdapStaticCredentials#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_static_credentials#id DataVaultLdapStaticCredentials#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1017,7 +1017,7 @@ namespace: str
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_static_credentials#namespace DataVaultLdapStaticCredentials#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_static_credentials#namespace DataVaultLdapStaticCredentials#namespace}
---
diff --git a/docs/dataVaultLdapStaticCredentials.typescript.md b/docs/dataVaultLdapStaticCredentials.typescript.md
index 7f82efd7..996e4f9a 100644
--- a/docs/dataVaultLdapStaticCredentials.typescript.md
+++ b/docs/dataVaultLdapStaticCredentials.typescript.md
@@ -4,7 +4,7 @@
### DataVaultLdapStaticCredentials
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_static_credentials vault_ldap_static_credentials}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_static_credentials vault_ldap_static_credentials}.
#### Initializers
@@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultLdapStaticCredent
The id of the existing DataVaultLdapStaticCredentials that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_static_credentials#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_static_credentials#import import section} in the documentation of this resource for the id to use
---
@@ -740,7 +740,7 @@ const dataVaultLdapStaticCredentialsConfig: dataVaultLdapStaticCredentials.DataV
| provisioners
| cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[]
| *No description.* |
| mount
| string
| LDAP Secret Backend to read credentials from. |
| roleName
| string
| Name of the role. |
-| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_static_credentials#id DataVaultLdapStaticCredentials#id}. |
+| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_static_credentials#id DataVaultLdapStaticCredentials#id}. |
| namespace
| string
| Target namespace. (requires Enterprise). |
---
@@ -825,7 +825,7 @@ public readonly mount: string;
LDAP Secret Backend to read credentials from.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_static_credentials#mount DataVaultLdapStaticCredentials#mount}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_static_credentials#mount DataVaultLdapStaticCredentials#mount}
---
@@ -839,7 +839,7 @@ public readonly roleName: string;
Name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_static_credentials#role_name DataVaultLdapStaticCredentials#role_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_static_credentials#role_name DataVaultLdapStaticCredentials#role_name}
---
@@ -851,7 +851,7 @@ public readonly id: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_static_credentials#id DataVaultLdapStaticCredentials#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_static_credentials#id DataVaultLdapStaticCredentials#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -868,7 +868,7 @@ public readonly namespace: string;
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_static_credentials#namespace DataVaultLdapStaticCredentials#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_static_credentials#namespace DataVaultLdapStaticCredentials#namespace}
---
diff --git a/docs/dataVaultNamespace.csharp.md b/docs/dataVaultNamespace.csharp.md
index 149a6ff7..ded2e1d5 100644
--- a/docs/dataVaultNamespace.csharp.md
+++ b/docs/dataVaultNamespace.csharp.md
@@ -4,7 +4,7 @@
### DataVaultNamespace
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespace vault_namespace}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespace vault_namespace}.
#### Initializers
@@ -386,7 +386,7 @@ The construct id used in the generated config for the DataVaultNamespace to impo
The id of the existing DataVaultNamespace that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespace#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespace#import import section} in the documentation of this resource for the id to use
---
@@ -690,7 +690,7 @@ new DataVaultNamespaceConfig {
| Lifecycle
| HashiCorp.Cdktf.TerraformResourceLifecycle
| *No description.* |
| Provider
| HashiCorp.Cdktf.TerraformProvider
| *No description.* |
| Provisioners
| object[]
| *No description.* |
-| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespace#id DataVaultNamespace#id}. |
+| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespace#id DataVaultNamespace#id}. |
| Namespace
| string
| Target namespace. (requires Enterprise). |
| Path
| string
| Namespace path. |
@@ -774,7 +774,7 @@ public string Id { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespace#id DataVaultNamespace#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespace#id DataVaultNamespace#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -791,7 +791,7 @@ public string Namespace { get; set; }
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespace#namespace DataVaultNamespace#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespace#namespace DataVaultNamespace#namespace}
---
@@ -805,7 +805,7 @@ public string Path { get; set; }
Namespace path.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespace#path DataVaultNamespace#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespace#path DataVaultNamespace#path}
---
diff --git a/docs/dataVaultNamespace.go.md b/docs/dataVaultNamespace.go.md
index 8059afdc..bfb6c94a 100644
--- a/docs/dataVaultNamespace.go.md
+++ b/docs/dataVaultNamespace.go.md
@@ -4,7 +4,7 @@
### DataVaultNamespace
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespace vault_namespace}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespace vault_namespace}.
#### Initializers
@@ -386,7 +386,7 @@ The construct id used in the generated config for the DataVaultNamespace to impo
The id of the existing DataVaultNamespace that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespace#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespace#import import section} in the documentation of this resource for the id to use
---
@@ -690,7 +690,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultnamespace"
| Lifecycle
| github.com/hashicorp/terraform-cdk-go/cdktf.TerraformResourceLifecycle
| *No description.* |
| Provider
| github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProvider
| *No description.* |
| Provisioners
| *[]interface{}
| *No description.* |
-| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespace#id DataVaultNamespace#id}. |
+| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespace#id DataVaultNamespace#id}. |
| Namespace
| *string
| Target namespace. (requires Enterprise). |
| Path
| *string
| Namespace path. |
@@ -774,7 +774,7 @@ Id *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespace#id DataVaultNamespace#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespace#id DataVaultNamespace#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -791,7 +791,7 @@ Namespace *string
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespace#namespace DataVaultNamespace#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespace#namespace DataVaultNamespace#namespace}
---
@@ -805,7 +805,7 @@ Path *string
Namespace path.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespace#path DataVaultNamespace#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespace#path DataVaultNamespace#path}
---
diff --git a/docs/dataVaultNamespace.java.md b/docs/dataVaultNamespace.java.md
index 10d5257a..1635d711 100644
--- a/docs/dataVaultNamespace.java.md
+++ b/docs/dataVaultNamespace.java.md
@@ -4,7 +4,7 @@
### DataVaultNamespace
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespace vault_namespace}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespace vault_namespace}.
#### Initializers
@@ -40,7 +40,7 @@ DataVaultNamespace.Builder.create(Construct scope, java.lang.String id)
| lifecycle
| com.hashicorp.cdktf.TerraformResourceLifecycle
| *No description.* |
| provider
| com.hashicorp.cdktf.TerraformProvider
| *No description.* |
| provisioners
| java.util.List
| *No description.* |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespace#id DataVaultNamespace#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespace#id DataVaultNamespace#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
| path
| java.lang.String
| Namespace path. |
@@ -110,7 +110,7 @@ Must be unique amongst siblings in the same scope
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespace#id DataVaultNamespace#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespace#id DataVaultNamespace#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -123,7 +123,7 @@ If you experience problems setting this value it might not be settable. Please t
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespace#namespace DataVaultNamespace#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespace#namespace DataVaultNamespace#namespace}
---
@@ -133,7 +133,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Namespace path.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespace#path DataVaultNamespace#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespace#path DataVaultNamespace#path}
---
@@ -477,7 +477,7 @@ The construct id used in the generated config for the DataVaultNamespace to impo
The id of the existing DataVaultNamespace that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespace#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespace#import import section} in the documentation of this resource for the id to use
---
@@ -785,7 +785,7 @@ DataVaultNamespaceConfig.builder()
| lifecycle
| com.hashicorp.cdktf.TerraformResourceLifecycle
| *No description.* |
| provider
| com.hashicorp.cdktf.TerraformProvider
| *No description.* |
| provisioners
| java.util.List
| *No description.* |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespace#id DataVaultNamespace#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespace#id DataVaultNamespace#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
| path
| java.lang.String
| Namespace path. |
@@ -869,7 +869,7 @@ public java.lang.String getId();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespace#id DataVaultNamespace#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespace#id DataVaultNamespace#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -886,7 +886,7 @@ public java.lang.String getNamespace();
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespace#namespace DataVaultNamespace#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespace#namespace DataVaultNamespace#namespace}
---
@@ -900,7 +900,7 @@ public java.lang.String getPath();
Namespace path.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespace#path DataVaultNamespace#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespace#path DataVaultNamespace#path}
---
diff --git a/docs/dataVaultNamespace.python.md b/docs/dataVaultNamespace.python.md
index 33552912..3dc559f7 100644
--- a/docs/dataVaultNamespace.python.md
+++ b/docs/dataVaultNamespace.python.md
@@ -4,7 +4,7 @@
### DataVaultNamespace
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespace vault_namespace}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespace vault_namespace}.
#### Initializers
@@ -38,7 +38,7 @@ dataVaultNamespace.DataVaultNamespace(
| lifecycle
| cdktf.TerraformResourceLifecycle
| *No description.* |
| provider
| cdktf.TerraformProvider
| *No description.* |
| provisioners
| typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]]
| *No description.* |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespace#id DataVaultNamespace#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespace#id DataVaultNamespace#id}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
| path
| str
| Namespace path. |
@@ -108,7 +108,7 @@ Must be unique amongst siblings in the same scope
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespace#id DataVaultNamespace#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespace#id DataVaultNamespace#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -121,7 +121,7 @@ If you experience problems setting this value it might not be settable. Please t
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespace#namespace DataVaultNamespace#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespace#namespace DataVaultNamespace#namespace}
---
@@ -131,7 +131,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Namespace path.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespace#path DataVaultNamespace#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespace#path DataVaultNamespace#path}
---
@@ -511,7 +511,7 @@ The construct id used in the generated config for the DataVaultNamespace to impo
The id of the existing DataVaultNamespace that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespace#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespace#import import section} in the documentation of this resource for the id to use
---
@@ -815,7 +815,7 @@ dataVaultNamespace.DataVaultNamespaceConfig(
| lifecycle
| cdktf.TerraformResourceLifecycle
| *No description.* |
| provider
| cdktf.TerraformProvider
| *No description.* |
| provisioners
| typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]]
| *No description.* |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespace#id DataVaultNamespace#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespace#id DataVaultNamespace#id}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
| path
| str
| Namespace path. |
@@ -899,7 +899,7 @@ id: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespace#id DataVaultNamespace#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespace#id DataVaultNamespace#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -916,7 +916,7 @@ namespace: str
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespace#namespace DataVaultNamespace#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespace#namespace DataVaultNamespace#namespace}
---
@@ -930,7 +930,7 @@ path: str
Namespace path.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespace#path DataVaultNamespace#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespace#path DataVaultNamespace#path}
---
diff --git a/docs/dataVaultNamespace.typescript.md b/docs/dataVaultNamespace.typescript.md
index 13026acb..5e258f6a 100644
--- a/docs/dataVaultNamespace.typescript.md
+++ b/docs/dataVaultNamespace.typescript.md
@@ -4,7 +4,7 @@
### DataVaultNamespace
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespace vault_namespace}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespace vault_namespace}.
#### Initializers
@@ -386,7 +386,7 @@ The construct id used in the generated config for the DataVaultNamespace to impo
The id of the existing DataVaultNamespace that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespace#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespace#import import section} in the documentation of this resource for the id to use
---
@@ -679,7 +679,7 @@ const dataVaultNamespaceConfig: dataVaultNamespace.DataVaultNamespaceConfig = {
| lifecycle
| cdktf.TerraformResourceLifecycle
| *No description.* |
| provider
| cdktf.TerraformProvider
| *No description.* |
| provisioners
| cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[]
| *No description.* |
-| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespace#id DataVaultNamespace#id}. |
+| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespace#id DataVaultNamespace#id}. |
| namespace
| string
| Target namespace. (requires Enterprise). |
| path
| string
| Namespace path. |
@@ -763,7 +763,7 @@ public readonly id: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespace#id DataVaultNamespace#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespace#id DataVaultNamespace#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -780,7 +780,7 @@ public readonly namespace: string;
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespace#namespace DataVaultNamespace#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespace#namespace DataVaultNamespace#namespace}
---
@@ -794,7 +794,7 @@ public readonly path: string;
Namespace path.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespace#path DataVaultNamespace#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespace#path DataVaultNamespace#path}
---
diff --git a/docs/dataVaultNamespaces.csharp.md b/docs/dataVaultNamespaces.csharp.md
index 4d008d6f..d3c9b893 100644
--- a/docs/dataVaultNamespaces.csharp.md
+++ b/docs/dataVaultNamespaces.csharp.md
@@ -4,7 +4,7 @@
### DataVaultNamespaces
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespaces vault_namespaces}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespaces vault_namespaces}.
#### Initializers
@@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultNamespaces to imp
The id of the existing DataVaultNamespaces that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespaces#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespaces#import import section} in the documentation of this resource for the id to use
---
@@ -638,7 +638,7 @@ new DataVaultNamespacesConfig {
| Lifecycle
| HashiCorp.Cdktf.TerraformResourceLifecycle
| *No description.* |
| Provider
| HashiCorp.Cdktf.TerraformProvider
| *No description.* |
| Provisioners
| object[]
| *No description.* |
-| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespaces#id DataVaultNamespaces#id}. |
+| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespaces#id DataVaultNamespaces#id}. |
| Namespace
| string
| Target namespace. (requires Enterprise). |
---
@@ -721,7 +721,7 @@ public string Id { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespaces#id DataVaultNamespaces#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespaces#id DataVaultNamespaces#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -738,7 +738,7 @@ public string Namespace { get; set; }
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespaces#namespace DataVaultNamespaces#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespaces#namespace DataVaultNamespaces#namespace}
---
diff --git a/docs/dataVaultNamespaces.go.md b/docs/dataVaultNamespaces.go.md
index 90957cb1..a08352fa 100644
--- a/docs/dataVaultNamespaces.go.md
+++ b/docs/dataVaultNamespaces.go.md
@@ -4,7 +4,7 @@
### DataVaultNamespaces
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespaces vault_namespaces}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespaces vault_namespaces}.
#### Initializers
@@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultNamespaces to imp
The id of the existing DataVaultNamespaces that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespaces#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespaces#import import section} in the documentation of this resource for the id to use
---
@@ -638,7 +638,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultnamespaces"
| Lifecycle
| github.com/hashicorp/terraform-cdk-go/cdktf.TerraformResourceLifecycle
| *No description.* |
| Provider
| github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProvider
| *No description.* |
| Provisioners
| *[]interface{}
| *No description.* |
-| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespaces#id DataVaultNamespaces#id}. |
+| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespaces#id DataVaultNamespaces#id}. |
| Namespace
| *string
| Target namespace. (requires Enterprise). |
---
@@ -721,7 +721,7 @@ Id *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespaces#id DataVaultNamespaces#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespaces#id DataVaultNamespaces#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -738,7 +738,7 @@ Namespace *string
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespaces#namespace DataVaultNamespaces#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespaces#namespace DataVaultNamespaces#namespace}
---
diff --git a/docs/dataVaultNamespaces.java.md b/docs/dataVaultNamespaces.java.md
index b909550e..6d71cc22 100644
--- a/docs/dataVaultNamespaces.java.md
+++ b/docs/dataVaultNamespaces.java.md
@@ -4,7 +4,7 @@
### DataVaultNamespaces
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespaces vault_namespaces}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespaces vault_namespaces}.
#### Initializers
@@ -39,7 +39,7 @@ DataVaultNamespaces.Builder.create(Construct scope, java.lang.String id)
| lifecycle
| com.hashicorp.cdktf.TerraformResourceLifecycle
| *No description.* |
| provider
| com.hashicorp.cdktf.TerraformProvider
| *No description.* |
| provisioners
| java.util.List
| *No description.* |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespaces#id DataVaultNamespaces#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespaces#id DataVaultNamespaces#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
---
@@ -108,7 +108,7 @@ Must be unique amongst siblings in the same scope
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespaces#id DataVaultNamespaces#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespaces#id DataVaultNamespaces#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -121,7 +121,7 @@ If you experience problems setting this value it might not be settable. Please t
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespaces#namespace DataVaultNamespaces#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespaces#namespace DataVaultNamespaces#namespace}
---
@@ -458,7 +458,7 @@ The construct id used in the generated config for the DataVaultNamespaces to imp
The id of the existing DataVaultNamespaces that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespaces#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespaces#import import section} in the documentation of this resource for the id to use
---
@@ -721,7 +721,7 @@ DataVaultNamespacesConfig.builder()
| lifecycle
| com.hashicorp.cdktf.TerraformResourceLifecycle
| *No description.* |
| provider
| com.hashicorp.cdktf.TerraformProvider
| *No description.* |
| provisioners
| java.util.List
| *No description.* |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespaces#id DataVaultNamespaces#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespaces#id DataVaultNamespaces#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
---
@@ -804,7 +804,7 @@ public java.lang.String getId();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespaces#id DataVaultNamespaces#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespaces#id DataVaultNamespaces#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -821,7 +821,7 @@ public java.lang.String getNamespace();
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespaces#namespace DataVaultNamespaces#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespaces#namespace DataVaultNamespaces#namespace}
---
diff --git a/docs/dataVaultNamespaces.python.md b/docs/dataVaultNamespaces.python.md
index 28818333..f4331a3a 100644
--- a/docs/dataVaultNamespaces.python.md
+++ b/docs/dataVaultNamespaces.python.md
@@ -4,7 +4,7 @@
### DataVaultNamespaces
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespaces vault_namespaces}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespaces vault_namespaces}.
#### Initializers
@@ -37,7 +37,7 @@ dataVaultNamespaces.DataVaultNamespaces(
| lifecycle
| cdktf.TerraformResourceLifecycle
| *No description.* |
| provider
| cdktf.TerraformProvider
| *No description.* |
| provisioners
| typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]]
| *No description.* |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespaces#id DataVaultNamespaces#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespaces#id DataVaultNamespaces#id}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
---
@@ -106,7 +106,7 @@ Must be unique amongst siblings in the same scope
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespaces#id DataVaultNamespaces#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespaces#id DataVaultNamespaces#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -119,7 +119,7 @@ If you experience problems setting this value it might not be settable. Please t
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespaces#namespace DataVaultNamespaces#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespaces#namespace DataVaultNamespaces#namespace}
---
@@ -492,7 +492,7 @@ The construct id used in the generated config for the DataVaultNamespaces to imp
The id of the existing DataVaultNamespaces that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespaces#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespaces#import import section} in the documentation of this resource for the id to use
---
@@ -751,7 +751,7 @@ dataVaultNamespaces.DataVaultNamespacesConfig(
| lifecycle
| cdktf.TerraformResourceLifecycle
| *No description.* |
| provider
| cdktf.TerraformProvider
| *No description.* |
| provisioners
| typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]]
| *No description.* |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespaces#id DataVaultNamespaces#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespaces#id DataVaultNamespaces#id}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
---
@@ -834,7 +834,7 @@ id: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespaces#id DataVaultNamespaces#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespaces#id DataVaultNamespaces#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -851,7 +851,7 @@ namespace: str
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespaces#namespace DataVaultNamespaces#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespaces#namespace DataVaultNamespaces#namespace}
---
diff --git a/docs/dataVaultNamespaces.typescript.md b/docs/dataVaultNamespaces.typescript.md
index 877547f8..9d42c135 100644
--- a/docs/dataVaultNamespaces.typescript.md
+++ b/docs/dataVaultNamespaces.typescript.md
@@ -4,7 +4,7 @@
### DataVaultNamespaces
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespaces vault_namespaces}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespaces vault_namespaces}.
#### Initializers
@@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultNamespaces to imp
The id of the existing DataVaultNamespaces that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespaces#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespaces#import import section} in the documentation of this resource for the id to use
---
@@ -628,7 +628,7 @@ const dataVaultNamespacesConfig: dataVaultNamespaces.DataVaultNamespacesConfig =
| lifecycle
| cdktf.TerraformResourceLifecycle
| *No description.* |
| provider
| cdktf.TerraformProvider
| *No description.* |
| provisioners
| cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[]
| *No description.* |
-| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespaces#id DataVaultNamespaces#id}. |
+| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespaces#id DataVaultNamespaces#id}. |
| namespace
| string
| Target namespace. (requires Enterprise). |
---
@@ -711,7 +711,7 @@ public readonly id: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespaces#id DataVaultNamespaces#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespaces#id DataVaultNamespaces#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -728,7 +728,7 @@ public readonly namespace: string;
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespaces#namespace DataVaultNamespaces#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespaces#namespace DataVaultNamespaces#namespace}
---
diff --git a/docs/dataVaultNomadAccessToken.csharp.md b/docs/dataVaultNomadAccessToken.csharp.md
index b82443f1..77e33915 100644
--- a/docs/dataVaultNomadAccessToken.csharp.md
+++ b/docs/dataVaultNomadAccessToken.csharp.md
@@ -4,7 +4,7 @@
### DataVaultNomadAccessToken
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/nomad_access_token vault_nomad_access_token}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/nomad_access_token vault_nomad_access_token}.
#### Initializers
@@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultNomadAccessToken
The id of the existing DataVaultNomadAccessToken that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/nomad_access_token#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/nomad_access_token#import import section} in the documentation of this resource for the id to use
---
@@ -697,7 +697,7 @@ new DataVaultNomadAccessTokenConfig {
| Provisioners
| object[]
| *No description.* |
| Backend
| string
| Nomad secret backend to generate tokens from. |
| Role
| string
| Name of the role. |
-| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/nomad_access_token#id DataVaultNomadAccessToken#id}. |
+| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/nomad_access_token#id DataVaultNomadAccessToken#id}. |
| Namespace
| string
| Target namespace. (requires Enterprise). |
---
@@ -782,7 +782,7 @@ public string Backend { get; set; }
Nomad secret backend to generate tokens from.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/nomad_access_token#backend DataVaultNomadAccessToken#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/nomad_access_token#backend DataVaultNomadAccessToken#backend}
---
@@ -796,7 +796,7 @@ public string Role { get; set; }
Name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/nomad_access_token#role DataVaultNomadAccessToken#role}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/nomad_access_token#role DataVaultNomadAccessToken#role}
---
@@ -808,7 +808,7 @@ public string Id { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/nomad_access_token#id DataVaultNomadAccessToken#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/nomad_access_token#id DataVaultNomadAccessToken#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -825,7 +825,7 @@ public string Namespace { get; set; }
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/nomad_access_token#namespace DataVaultNomadAccessToken#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/nomad_access_token#namespace DataVaultNomadAccessToken#namespace}
---
diff --git a/docs/dataVaultNomadAccessToken.go.md b/docs/dataVaultNomadAccessToken.go.md
index ab291e03..72a2ed8c 100644
--- a/docs/dataVaultNomadAccessToken.go.md
+++ b/docs/dataVaultNomadAccessToken.go.md
@@ -4,7 +4,7 @@
### DataVaultNomadAccessToken
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/nomad_access_token vault_nomad_access_token}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/nomad_access_token vault_nomad_access_token}.
#### Initializers
@@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultNomadAccessToken
The id of the existing DataVaultNomadAccessToken that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/nomad_access_token#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/nomad_access_token#import import section} in the documentation of this resource for the id to use
---
@@ -697,7 +697,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultnomadaccesst
| Provisioners
| *[]interface{}
| *No description.* |
| Backend
| *string
| Nomad secret backend to generate tokens from. |
| Role
| *string
| Name of the role. |
-| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/nomad_access_token#id DataVaultNomadAccessToken#id}. |
+| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/nomad_access_token#id DataVaultNomadAccessToken#id}. |
| Namespace
| *string
| Target namespace. (requires Enterprise). |
---
@@ -782,7 +782,7 @@ Backend *string
Nomad secret backend to generate tokens from.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/nomad_access_token#backend DataVaultNomadAccessToken#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/nomad_access_token#backend DataVaultNomadAccessToken#backend}
---
@@ -796,7 +796,7 @@ Role *string
Name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/nomad_access_token#role DataVaultNomadAccessToken#role}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/nomad_access_token#role DataVaultNomadAccessToken#role}
---
@@ -808,7 +808,7 @@ Id *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/nomad_access_token#id DataVaultNomadAccessToken#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/nomad_access_token#id DataVaultNomadAccessToken#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -825,7 +825,7 @@ Namespace *string
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/nomad_access_token#namespace DataVaultNomadAccessToken#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/nomad_access_token#namespace DataVaultNomadAccessToken#namespace}
---
diff --git a/docs/dataVaultNomadAccessToken.java.md b/docs/dataVaultNomadAccessToken.java.md
index 24f2aaca..e6e0f1d3 100644
--- a/docs/dataVaultNomadAccessToken.java.md
+++ b/docs/dataVaultNomadAccessToken.java.md
@@ -4,7 +4,7 @@
### DataVaultNomadAccessToken
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/nomad_access_token vault_nomad_access_token}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/nomad_access_token vault_nomad_access_token}.
#### Initializers
@@ -43,7 +43,7 @@ DataVaultNomadAccessToken.Builder.create(Construct scope, java.lang.String id)
| provisioners
| java.util.List
| *No description.* |
| backend
| java.lang.String
| Nomad secret backend to generate tokens from. |
| role
| java.lang.String
| Name of the role. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/nomad_access_token#id DataVaultNomadAccessToken#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/nomad_access_token#id DataVaultNomadAccessToken#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
---
@@ -114,7 +114,7 @@ Must be unique amongst siblings in the same scope
Nomad secret backend to generate tokens from.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/nomad_access_token#backend DataVaultNomadAccessToken#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/nomad_access_token#backend DataVaultNomadAccessToken#backend}
---
@@ -124,7 +124,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/nomad_access_token#role DataVaultNomadAccessToken#role}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/nomad_access_token#role DataVaultNomadAccessToken#role}
---
@@ -132,7 +132,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/nomad_access_token#id DataVaultNomadAccessToken#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/nomad_access_token#id DataVaultNomadAccessToken#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -145,7 +145,7 @@ If you experience problems setting this value it might not be settable. Please t
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/nomad_access_token#namespace DataVaultNomadAccessToken#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/nomad_access_token#namespace DataVaultNomadAccessToken#namespace}
---
@@ -482,7 +482,7 @@ The construct id used in the generated config for the DataVaultNomadAccessToken
The id of the existing DataVaultNomadAccessToken that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/nomad_access_token#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/nomad_access_token#import import section} in the documentation of this resource for the id to use
---
@@ -804,7 +804,7 @@ DataVaultNomadAccessTokenConfig.builder()
| provisioners
| java.util.List
| *No description.* |
| backend
| java.lang.String
| Nomad secret backend to generate tokens from. |
| role
| java.lang.String
| Name of the role. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/nomad_access_token#id DataVaultNomadAccessToken#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/nomad_access_token#id DataVaultNomadAccessToken#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
---
@@ -889,7 +889,7 @@ public java.lang.String getBackend();
Nomad secret backend to generate tokens from.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/nomad_access_token#backend DataVaultNomadAccessToken#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/nomad_access_token#backend DataVaultNomadAccessToken#backend}
---
@@ -903,7 +903,7 @@ public java.lang.String getRole();
Name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/nomad_access_token#role DataVaultNomadAccessToken#role}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/nomad_access_token#role DataVaultNomadAccessToken#role}
---
@@ -915,7 +915,7 @@ public java.lang.String getId();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/nomad_access_token#id DataVaultNomadAccessToken#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/nomad_access_token#id DataVaultNomadAccessToken#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -932,7 +932,7 @@ public java.lang.String getNamespace();
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/nomad_access_token#namespace DataVaultNomadAccessToken#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/nomad_access_token#namespace DataVaultNomadAccessToken#namespace}
---
diff --git a/docs/dataVaultNomadAccessToken.python.md b/docs/dataVaultNomadAccessToken.python.md
index 56e984d8..e1380b11 100644
--- a/docs/dataVaultNomadAccessToken.python.md
+++ b/docs/dataVaultNomadAccessToken.python.md
@@ -4,7 +4,7 @@
### DataVaultNomadAccessToken
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/nomad_access_token vault_nomad_access_token}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/nomad_access_token vault_nomad_access_token}.
#### Initializers
@@ -41,7 +41,7 @@ dataVaultNomadAccessToken.DataVaultNomadAccessToken(
| provisioners
| typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]]
| *No description.* |
| backend
| str
| Nomad secret backend to generate tokens from. |
| role
| str
| Name of the role. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/nomad_access_token#id DataVaultNomadAccessToken#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/nomad_access_token#id DataVaultNomadAccessToken#id}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
---
@@ -112,7 +112,7 @@ Must be unique amongst siblings in the same scope
Nomad secret backend to generate tokens from.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/nomad_access_token#backend DataVaultNomadAccessToken#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/nomad_access_token#backend DataVaultNomadAccessToken#backend}
---
@@ -122,7 +122,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/nomad_access_token#role DataVaultNomadAccessToken#role}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/nomad_access_token#role DataVaultNomadAccessToken#role}
---
@@ -130,7 +130,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/nomad_access_token#id DataVaultNomadAccessToken#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/nomad_access_token#id DataVaultNomadAccessToken#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -143,7 +143,7 @@ If you experience problems setting this value it might not be settable. Please t
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/nomad_access_token#namespace DataVaultNomadAccessToken#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/nomad_access_token#namespace DataVaultNomadAccessToken#namespace}
---
@@ -516,7 +516,7 @@ The construct id used in the generated config for the DataVaultNomadAccessToken
The id of the existing DataVaultNomadAccessToken that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/nomad_access_token#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/nomad_access_token#import import section} in the documentation of this resource for the id to use
---
@@ -834,7 +834,7 @@ dataVaultNomadAccessToken.DataVaultNomadAccessTokenConfig(
| provisioners
| typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]]
| *No description.* |
| backend
| str
| Nomad secret backend to generate tokens from. |
| role
| str
| Name of the role. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/nomad_access_token#id DataVaultNomadAccessToken#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/nomad_access_token#id DataVaultNomadAccessToken#id}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
---
@@ -919,7 +919,7 @@ backend: str
Nomad secret backend to generate tokens from.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/nomad_access_token#backend DataVaultNomadAccessToken#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/nomad_access_token#backend DataVaultNomadAccessToken#backend}
---
@@ -933,7 +933,7 @@ role: str
Name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/nomad_access_token#role DataVaultNomadAccessToken#role}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/nomad_access_token#role DataVaultNomadAccessToken#role}
---
@@ -945,7 +945,7 @@ id: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/nomad_access_token#id DataVaultNomadAccessToken#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/nomad_access_token#id DataVaultNomadAccessToken#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -962,7 +962,7 @@ namespace: str
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/nomad_access_token#namespace DataVaultNomadAccessToken#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/nomad_access_token#namespace DataVaultNomadAccessToken#namespace}
---
diff --git a/docs/dataVaultNomadAccessToken.typescript.md b/docs/dataVaultNomadAccessToken.typescript.md
index 86f5e6fb..212036dd 100644
--- a/docs/dataVaultNomadAccessToken.typescript.md
+++ b/docs/dataVaultNomadAccessToken.typescript.md
@@ -4,7 +4,7 @@
### DataVaultNomadAccessToken
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/nomad_access_token vault_nomad_access_token}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/nomad_access_token vault_nomad_access_token}.
#### Initializers
@@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultNomadAccessToken
The id of the existing DataVaultNomadAccessToken that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/nomad_access_token#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/nomad_access_token#import import section} in the documentation of this resource for the id to use
---
@@ -685,7 +685,7 @@ const dataVaultNomadAccessTokenConfig: dataVaultNomadAccessToken.DataVaultNomadA
| provisioners
| cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[]
| *No description.* |
| backend
| string
| Nomad secret backend to generate tokens from. |
| role
| string
| Name of the role. |
-| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/nomad_access_token#id DataVaultNomadAccessToken#id}. |
+| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/nomad_access_token#id DataVaultNomadAccessToken#id}. |
| namespace
| string
| Target namespace. (requires Enterprise). |
---
@@ -770,7 +770,7 @@ public readonly backend: string;
Nomad secret backend to generate tokens from.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/nomad_access_token#backend DataVaultNomadAccessToken#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/nomad_access_token#backend DataVaultNomadAccessToken#backend}
---
@@ -784,7 +784,7 @@ public readonly role: string;
Name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/nomad_access_token#role DataVaultNomadAccessToken#role}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/nomad_access_token#role DataVaultNomadAccessToken#role}
---
@@ -796,7 +796,7 @@ public readonly id: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/nomad_access_token#id DataVaultNomadAccessToken#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/nomad_access_token#id DataVaultNomadAccessToken#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -813,7 +813,7 @@ public readonly namespace: string;
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/nomad_access_token#namespace DataVaultNomadAccessToken#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/nomad_access_token#namespace DataVaultNomadAccessToken#namespace}
---
diff --git a/docs/dataVaultPkiSecretBackendConfigEst.csharp.md b/docs/dataVaultPkiSecretBackendConfigEst.csharp.md
index 06eee68d..9fefa8d1 100644
--- a/docs/dataVaultPkiSecretBackendConfigEst.csharp.md
+++ b/docs/dataVaultPkiSecretBackendConfigEst.csharp.md
@@ -4,7 +4,7 @@
### DataVaultPkiSecretBackendConfigEst
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_config_est vault_pki_secret_backend_config_est}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_config_est vault_pki_secret_backend_config_est}.
#### Initializers
@@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultPkiSecretBackendC
The id of the existing DataVaultPkiSecretBackendConfigEst that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_config_est#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_config_est#import import section} in the documentation of this resource for the id to use
---
@@ -752,7 +752,7 @@ new DataVaultPkiSecretBackendConfigEstConfig {
| Provider
| HashiCorp.Cdktf.TerraformProvider
| *No description.* |
| Provisioners
| object[]
| *No description.* |
| Backend
| string
| Path where PKI engine is mounted. |
-| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_config_est#id DataVaultPkiSecretBackendConfigEst#id}. |
+| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_config_est#id DataVaultPkiSecretBackendConfigEst#id}. |
| Namespace
| string
| Target namespace. (requires Enterprise). |
---
@@ -837,7 +837,7 @@ public string Backend { get; set; }
Path where PKI engine is mounted.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_config_est#backend DataVaultPkiSecretBackendConfigEst#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_config_est#backend DataVaultPkiSecretBackendConfigEst#backend}
---
@@ -849,7 +849,7 @@ public string Id { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_config_est#id DataVaultPkiSecretBackendConfigEst#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_config_est#id DataVaultPkiSecretBackendConfigEst#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -866,7 +866,7 @@ public string Namespace { get; set; }
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_config_est#namespace DataVaultPkiSecretBackendConfigEst#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_config_est#namespace DataVaultPkiSecretBackendConfigEst#namespace}
---
diff --git a/docs/dataVaultPkiSecretBackendConfigEst.go.md b/docs/dataVaultPkiSecretBackendConfigEst.go.md
index 9094a8d4..8953ac09 100644
--- a/docs/dataVaultPkiSecretBackendConfigEst.go.md
+++ b/docs/dataVaultPkiSecretBackendConfigEst.go.md
@@ -4,7 +4,7 @@
### DataVaultPkiSecretBackendConfigEst
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_config_est vault_pki_secret_backend_config_est}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_config_est vault_pki_secret_backend_config_est}.
#### Initializers
@@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultPkiSecretBackendC
The id of the existing DataVaultPkiSecretBackendConfigEst that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_config_est#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_config_est#import import section} in the documentation of this resource for the id to use
---
@@ -752,7 +752,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultpkisecretbac
| Provider
| github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProvider
| *No description.* |
| Provisioners
| *[]interface{}
| *No description.* |
| Backend
| *string
| Path where PKI engine is mounted. |
-| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_config_est#id DataVaultPkiSecretBackendConfigEst#id}. |
+| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_config_est#id DataVaultPkiSecretBackendConfigEst#id}. |
| Namespace
| *string
| Target namespace. (requires Enterprise). |
---
@@ -837,7 +837,7 @@ Backend *string
Path where PKI engine is mounted.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_config_est#backend DataVaultPkiSecretBackendConfigEst#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_config_est#backend DataVaultPkiSecretBackendConfigEst#backend}
---
@@ -849,7 +849,7 @@ Id *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_config_est#id DataVaultPkiSecretBackendConfigEst#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_config_est#id DataVaultPkiSecretBackendConfigEst#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -866,7 +866,7 @@ Namespace *string
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_config_est#namespace DataVaultPkiSecretBackendConfigEst#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_config_est#namespace DataVaultPkiSecretBackendConfigEst#namespace}
---
diff --git a/docs/dataVaultPkiSecretBackendConfigEst.java.md b/docs/dataVaultPkiSecretBackendConfigEst.java.md
index 11181746..323189f9 100644
--- a/docs/dataVaultPkiSecretBackendConfigEst.java.md
+++ b/docs/dataVaultPkiSecretBackendConfigEst.java.md
@@ -4,7 +4,7 @@
### DataVaultPkiSecretBackendConfigEst
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_config_est vault_pki_secret_backend_config_est}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_config_est vault_pki_secret_backend_config_est}.
#### Initializers
@@ -41,7 +41,7 @@ DataVaultPkiSecretBackendConfigEst.Builder.create(Construct scope, java.lang.Str
| provider
| com.hashicorp.cdktf.TerraformProvider
| *No description.* |
| provisioners
| java.util.List
| *No description.* |
| backend
| java.lang.String
| Path where PKI engine is mounted. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_config_est#id DataVaultPkiSecretBackendConfigEst#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_config_est#id DataVaultPkiSecretBackendConfigEst#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
---
@@ -112,7 +112,7 @@ Must be unique amongst siblings in the same scope
Path where PKI engine is mounted.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_config_est#backend DataVaultPkiSecretBackendConfigEst#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_config_est#backend DataVaultPkiSecretBackendConfigEst#backend}
---
@@ -120,7 +120,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_config_est#id DataVaultPkiSecretBackendConfigEst#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_config_est#id DataVaultPkiSecretBackendConfigEst#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -133,7 +133,7 @@ If you experience problems setting this value it might not be settable. Please t
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_config_est#namespace DataVaultPkiSecretBackendConfigEst#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_config_est#namespace DataVaultPkiSecretBackendConfigEst#namespace}
---
@@ -470,7 +470,7 @@ The construct id used in the generated config for the DataVaultPkiSecretBackendC
The id of the existing DataVaultPkiSecretBackendConfigEst that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_config_est#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_config_est#import import section} in the documentation of this resource for the id to use
---
@@ -846,7 +846,7 @@ DataVaultPkiSecretBackendConfigEstConfig.builder()
| provider
| com.hashicorp.cdktf.TerraformProvider
| *No description.* |
| provisioners
| java.util.List
| *No description.* |
| backend
| java.lang.String
| Path where PKI engine is mounted. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_config_est#id DataVaultPkiSecretBackendConfigEst#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_config_est#id DataVaultPkiSecretBackendConfigEst#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
---
@@ -931,7 +931,7 @@ public java.lang.String getBackend();
Path where PKI engine is mounted.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_config_est#backend DataVaultPkiSecretBackendConfigEst#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_config_est#backend DataVaultPkiSecretBackendConfigEst#backend}
---
@@ -943,7 +943,7 @@ public java.lang.String getId();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_config_est#id DataVaultPkiSecretBackendConfigEst#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_config_est#id DataVaultPkiSecretBackendConfigEst#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -960,7 +960,7 @@ public java.lang.String getNamespace();
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_config_est#namespace DataVaultPkiSecretBackendConfigEst#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_config_est#namespace DataVaultPkiSecretBackendConfigEst#namespace}
---
diff --git a/docs/dataVaultPkiSecretBackendConfigEst.python.md b/docs/dataVaultPkiSecretBackendConfigEst.python.md
index 249c840d..28c36622 100644
--- a/docs/dataVaultPkiSecretBackendConfigEst.python.md
+++ b/docs/dataVaultPkiSecretBackendConfigEst.python.md
@@ -4,7 +4,7 @@
### DataVaultPkiSecretBackendConfigEst
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_config_est vault_pki_secret_backend_config_est}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_config_est vault_pki_secret_backend_config_est}.
#### Initializers
@@ -39,7 +39,7 @@ dataVaultPkiSecretBackendConfigEst.DataVaultPkiSecretBackendConfigEst(
| provider
| cdktf.TerraformProvider
| *No description.* |
| provisioners
| typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]]
| *No description.* |
| backend
| str
| Path where PKI engine is mounted. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_config_est#id DataVaultPkiSecretBackendConfigEst#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_config_est#id DataVaultPkiSecretBackendConfigEst#id}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
---
@@ -110,7 +110,7 @@ Must be unique amongst siblings in the same scope
Path where PKI engine is mounted.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_config_est#backend DataVaultPkiSecretBackendConfigEst#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_config_est#backend DataVaultPkiSecretBackendConfigEst#backend}
---
@@ -118,7 +118,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_config_est#id DataVaultPkiSecretBackendConfigEst#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_config_est#id DataVaultPkiSecretBackendConfigEst#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -131,7 +131,7 @@ If you experience problems setting this value it might not be settable. Please t
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_config_est#namespace DataVaultPkiSecretBackendConfigEst#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_config_est#namespace DataVaultPkiSecretBackendConfigEst#namespace}
---
@@ -504,7 +504,7 @@ The construct id used in the generated config for the DataVaultPkiSecretBackendC
The id of the existing DataVaultPkiSecretBackendConfigEst that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_config_est#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_config_est#import import section} in the documentation of this resource for the id to use
---
@@ -875,7 +875,7 @@ dataVaultPkiSecretBackendConfigEst.DataVaultPkiSecretBackendConfigEstConfig(
| provider
| cdktf.TerraformProvider
| *No description.* |
| provisioners
| typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]]
| *No description.* |
| backend
| str
| Path where PKI engine is mounted. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_config_est#id DataVaultPkiSecretBackendConfigEst#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_config_est#id DataVaultPkiSecretBackendConfigEst#id}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
---
@@ -960,7 +960,7 @@ backend: str
Path where PKI engine is mounted.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_config_est#backend DataVaultPkiSecretBackendConfigEst#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_config_est#backend DataVaultPkiSecretBackendConfigEst#backend}
---
@@ -972,7 +972,7 @@ id: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_config_est#id DataVaultPkiSecretBackendConfigEst#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_config_est#id DataVaultPkiSecretBackendConfigEst#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -989,7 +989,7 @@ namespace: str
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_config_est#namespace DataVaultPkiSecretBackendConfigEst#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_config_est#namespace DataVaultPkiSecretBackendConfigEst#namespace}
---
diff --git a/docs/dataVaultPkiSecretBackendConfigEst.typescript.md b/docs/dataVaultPkiSecretBackendConfigEst.typescript.md
index b1f2dd56..fa52fc3e 100644
--- a/docs/dataVaultPkiSecretBackendConfigEst.typescript.md
+++ b/docs/dataVaultPkiSecretBackendConfigEst.typescript.md
@@ -4,7 +4,7 @@
### DataVaultPkiSecretBackendConfigEst
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_config_est vault_pki_secret_backend_config_est}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_config_est vault_pki_secret_backend_config_est}.
#### Initializers
@@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultPkiSecretBackendC
The id of the existing DataVaultPkiSecretBackendConfigEst that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_config_est#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_config_est#import import section} in the documentation of this resource for the id to use
---
@@ -739,7 +739,7 @@ const dataVaultPkiSecretBackendConfigEstConfig: dataVaultPkiSecretBackendConfigE
| provider
| cdktf.TerraformProvider
| *No description.* |
| provisioners
| cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[]
| *No description.* |
| backend
| string
| Path where PKI engine is mounted. |
-| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_config_est#id DataVaultPkiSecretBackendConfigEst#id}. |
+| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_config_est#id DataVaultPkiSecretBackendConfigEst#id}. |
| namespace
| string
| Target namespace. (requires Enterprise). |
---
@@ -824,7 +824,7 @@ public readonly backend: string;
Path where PKI engine is mounted.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_config_est#backend DataVaultPkiSecretBackendConfigEst#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_config_est#backend DataVaultPkiSecretBackendConfigEst#backend}
---
@@ -836,7 +836,7 @@ public readonly id: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_config_est#id DataVaultPkiSecretBackendConfigEst#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_config_est#id DataVaultPkiSecretBackendConfigEst#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -853,7 +853,7 @@ public readonly namespace: string;
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_config_est#namespace DataVaultPkiSecretBackendConfigEst#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_config_est#namespace DataVaultPkiSecretBackendConfigEst#namespace}
---
diff --git a/docs/dataVaultPkiSecretBackendIssuer.csharp.md b/docs/dataVaultPkiSecretBackendIssuer.csharp.md
index 06b392d4..812aff9e 100644
--- a/docs/dataVaultPkiSecretBackendIssuer.csharp.md
+++ b/docs/dataVaultPkiSecretBackendIssuer.csharp.md
@@ -4,7 +4,7 @@
### DataVaultPkiSecretBackendIssuer
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuer vault_pki_secret_backend_issuer}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuer vault_pki_secret_backend_issuer}.
#### Initializers
@@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultPkiSecretBackendI
The id of the existing DataVaultPkiSecretBackendIssuer that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuer#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuer#import import section} in the documentation of this resource for the id to use
---
@@ -763,7 +763,7 @@ new DataVaultPkiSecretBackendIssuerConfig {
| Provisioners
| object[]
| *No description.* |
| Backend
| string
| Full path where PKI backend is mounted. |
| IssuerRef
| string
| Reference to an existing issuer. |
-| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuer#id DataVaultPkiSecretBackendIssuer#id}. |
+| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuer#id DataVaultPkiSecretBackendIssuer#id}. |
| Namespace
| string
| Target namespace. (requires Enterprise). |
---
@@ -848,7 +848,7 @@ public string Backend { get; set; }
Full path where PKI backend is mounted.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuer#backend DataVaultPkiSecretBackendIssuer#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuer#backend DataVaultPkiSecretBackendIssuer#backend}
---
@@ -862,7 +862,7 @@ public string IssuerRef { get; set; }
Reference to an existing issuer.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuer#issuer_ref DataVaultPkiSecretBackendIssuer#issuer_ref}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuer#issuer_ref DataVaultPkiSecretBackendIssuer#issuer_ref}
---
@@ -874,7 +874,7 @@ public string Id { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuer#id DataVaultPkiSecretBackendIssuer#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuer#id DataVaultPkiSecretBackendIssuer#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -891,7 +891,7 @@ public string Namespace { get; set; }
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuer#namespace DataVaultPkiSecretBackendIssuer#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuer#namespace DataVaultPkiSecretBackendIssuer#namespace}
---
diff --git a/docs/dataVaultPkiSecretBackendIssuer.go.md b/docs/dataVaultPkiSecretBackendIssuer.go.md
index 4b5bca49..8ec8f561 100644
--- a/docs/dataVaultPkiSecretBackendIssuer.go.md
+++ b/docs/dataVaultPkiSecretBackendIssuer.go.md
@@ -4,7 +4,7 @@
### DataVaultPkiSecretBackendIssuer
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuer vault_pki_secret_backend_issuer}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuer vault_pki_secret_backend_issuer}.
#### Initializers
@@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultPkiSecretBackendI
The id of the existing DataVaultPkiSecretBackendIssuer that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuer#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuer#import import section} in the documentation of this resource for the id to use
---
@@ -763,7 +763,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultpkisecretbac
| Provisioners
| *[]interface{}
| *No description.* |
| Backend
| *string
| Full path where PKI backend is mounted. |
| IssuerRef
| *string
| Reference to an existing issuer. |
-| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuer#id DataVaultPkiSecretBackendIssuer#id}. |
+| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuer#id DataVaultPkiSecretBackendIssuer#id}. |
| Namespace
| *string
| Target namespace. (requires Enterprise). |
---
@@ -848,7 +848,7 @@ Backend *string
Full path where PKI backend is mounted.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuer#backend DataVaultPkiSecretBackendIssuer#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuer#backend DataVaultPkiSecretBackendIssuer#backend}
---
@@ -862,7 +862,7 @@ IssuerRef *string
Reference to an existing issuer.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuer#issuer_ref DataVaultPkiSecretBackendIssuer#issuer_ref}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuer#issuer_ref DataVaultPkiSecretBackendIssuer#issuer_ref}
---
@@ -874,7 +874,7 @@ Id *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuer#id DataVaultPkiSecretBackendIssuer#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuer#id DataVaultPkiSecretBackendIssuer#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -891,7 +891,7 @@ Namespace *string
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuer#namespace DataVaultPkiSecretBackendIssuer#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuer#namespace DataVaultPkiSecretBackendIssuer#namespace}
---
diff --git a/docs/dataVaultPkiSecretBackendIssuer.java.md b/docs/dataVaultPkiSecretBackendIssuer.java.md
index 8c514ddb..53ef78f6 100644
--- a/docs/dataVaultPkiSecretBackendIssuer.java.md
+++ b/docs/dataVaultPkiSecretBackendIssuer.java.md
@@ -4,7 +4,7 @@
### DataVaultPkiSecretBackendIssuer
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuer vault_pki_secret_backend_issuer}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuer vault_pki_secret_backend_issuer}.
#### Initializers
@@ -43,7 +43,7 @@ DataVaultPkiSecretBackendIssuer.Builder.create(Construct scope, java.lang.String
| provisioners
| java.util.List
| *No description.* |
| backend
| java.lang.String
| Full path where PKI backend is mounted. |
| issuerRef
| java.lang.String
| Reference to an existing issuer. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuer#id DataVaultPkiSecretBackendIssuer#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuer#id DataVaultPkiSecretBackendIssuer#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
---
@@ -114,7 +114,7 @@ Must be unique amongst siblings in the same scope
Full path where PKI backend is mounted.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuer#backend DataVaultPkiSecretBackendIssuer#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuer#backend DataVaultPkiSecretBackendIssuer#backend}
---
@@ -124,7 +124,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Reference to an existing issuer.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuer#issuer_ref DataVaultPkiSecretBackendIssuer#issuer_ref}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuer#issuer_ref DataVaultPkiSecretBackendIssuer#issuer_ref}
---
@@ -132,7 +132,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuer#id DataVaultPkiSecretBackendIssuer#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuer#id DataVaultPkiSecretBackendIssuer#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -145,7 +145,7 @@ If you experience problems setting this value it might not be settable. Please t
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuer#namespace DataVaultPkiSecretBackendIssuer#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuer#namespace DataVaultPkiSecretBackendIssuer#namespace}
---
@@ -482,7 +482,7 @@ The construct id used in the generated config for the DataVaultPkiSecretBackendI
The id of the existing DataVaultPkiSecretBackendIssuer that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuer#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuer#import import section} in the documentation of this resource for the id to use
---
@@ -870,7 +870,7 @@ DataVaultPkiSecretBackendIssuerConfig.builder()
| provisioners
| java.util.List
| *No description.* |
| backend
| java.lang.String
| Full path where PKI backend is mounted. |
| issuerRef
| java.lang.String
| Reference to an existing issuer. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuer#id DataVaultPkiSecretBackendIssuer#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuer#id DataVaultPkiSecretBackendIssuer#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
---
@@ -955,7 +955,7 @@ public java.lang.String getBackend();
Full path where PKI backend is mounted.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuer#backend DataVaultPkiSecretBackendIssuer#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuer#backend DataVaultPkiSecretBackendIssuer#backend}
---
@@ -969,7 +969,7 @@ public java.lang.String getIssuerRef();
Reference to an existing issuer.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuer#issuer_ref DataVaultPkiSecretBackendIssuer#issuer_ref}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuer#issuer_ref DataVaultPkiSecretBackendIssuer#issuer_ref}
---
@@ -981,7 +981,7 @@ public java.lang.String getId();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuer#id DataVaultPkiSecretBackendIssuer#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuer#id DataVaultPkiSecretBackendIssuer#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -998,7 +998,7 @@ public java.lang.String getNamespace();
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuer#namespace DataVaultPkiSecretBackendIssuer#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuer#namespace DataVaultPkiSecretBackendIssuer#namespace}
---
diff --git a/docs/dataVaultPkiSecretBackendIssuer.python.md b/docs/dataVaultPkiSecretBackendIssuer.python.md
index 0091096e..2ccdc585 100644
--- a/docs/dataVaultPkiSecretBackendIssuer.python.md
+++ b/docs/dataVaultPkiSecretBackendIssuer.python.md
@@ -4,7 +4,7 @@
### DataVaultPkiSecretBackendIssuer
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuer vault_pki_secret_backend_issuer}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuer vault_pki_secret_backend_issuer}.
#### Initializers
@@ -41,7 +41,7 @@ dataVaultPkiSecretBackendIssuer.DataVaultPkiSecretBackendIssuer(
| provisioners
| typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]]
| *No description.* |
| backend
| str
| Full path where PKI backend is mounted. |
| issuer_ref
| str
| Reference to an existing issuer. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuer#id DataVaultPkiSecretBackendIssuer#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuer#id DataVaultPkiSecretBackendIssuer#id}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
---
@@ -112,7 +112,7 @@ Must be unique amongst siblings in the same scope
Full path where PKI backend is mounted.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuer#backend DataVaultPkiSecretBackendIssuer#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuer#backend DataVaultPkiSecretBackendIssuer#backend}
---
@@ -122,7 +122,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Reference to an existing issuer.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuer#issuer_ref DataVaultPkiSecretBackendIssuer#issuer_ref}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuer#issuer_ref DataVaultPkiSecretBackendIssuer#issuer_ref}
---
@@ -130,7 +130,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuer#id DataVaultPkiSecretBackendIssuer#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuer#id DataVaultPkiSecretBackendIssuer#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -143,7 +143,7 @@ If you experience problems setting this value it might not be settable. Please t
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuer#namespace DataVaultPkiSecretBackendIssuer#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuer#namespace DataVaultPkiSecretBackendIssuer#namespace}
---
@@ -516,7 +516,7 @@ The construct id used in the generated config for the DataVaultPkiSecretBackendI
The id of the existing DataVaultPkiSecretBackendIssuer that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuer#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuer#import import section} in the documentation of this resource for the id to use
---
@@ -900,7 +900,7 @@ dataVaultPkiSecretBackendIssuer.DataVaultPkiSecretBackendIssuerConfig(
| provisioners
| typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]]
| *No description.* |
| backend
| str
| Full path where PKI backend is mounted. |
| issuer_ref
| str
| Reference to an existing issuer. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuer#id DataVaultPkiSecretBackendIssuer#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuer#id DataVaultPkiSecretBackendIssuer#id}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
---
@@ -985,7 +985,7 @@ backend: str
Full path where PKI backend is mounted.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuer#backend DataVaultPkiSecretBackendIssuer#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuer#backend DataVaultPkiSecretBackendIssuer#backend}
---
@@ -999,7 +999,7 @@ issuer_ref: str
Reference to an existing issuer.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuer#issuer_ref DataVaultPkiSecretBackendIssuer#issuer_ref}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuer#issuer_ref DataVaultPkiSecretBackendIssuer#issuer_ref}
---
@@ -1011,7 +1011,7 @@ id: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuer#id DataVaultPkiSecretBackendIssuer#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuer#id DataVaultPkiSecretBackendIssuer#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1028,7 +1028,7 @@ namespace: str
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuer#namespace DataVaultPkiSecretBackendIssuer#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuer#namespace DataVaultPkiSecretBackendIssuer#namespace}
---
diff --git a/docs/dataVaultPkiSecretBackendIssuer.typescript.md b/docs/dataVaultPkiSecretBackendIssuer.typescript.md
index 9de48986..98152eef 100644
--- a/docs/dataVaultPkiSecretBackendIssuer.typescript.md
+++ b/docs/dataVaultPkiSecretBackendIssuer.typescript.md
@@ -4,7 +4,7 @@
### DataVaultPkiSecretBackendIssuer
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuer vault_pki_secret_backend_issuer}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuer vault_pki_secret_backend_issuer}.
#### Initializers
@@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultPkiSecretBackendI
The id of the existing DataVaultPkiSecretBackendIssuer that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuer#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuer#import import section} in the documentation of this resource for the id to use
---
@@ -751,7 +751,7 @@ const dataVaultPkiSecretBackendIssuerConfig: dataVaultPkiSecretBackendIssuer.Dat
| provisioners
| cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[]
| *No description.* |
| backend
| string
| Full path where PKI backend is mounted. |
| issuerRef
| string
| Reference to an existing issuer. |
-| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuer#id DataVaultPkiSecretBackendIssuer#id}. |
+| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuer#id DataVaultPkiSecretBackendIssuer#id}. |
| namespace
| string
| Target namespace. (requires Enterprise). |
---
@@ -836,7 +836,7 @@ public readonly backend: string;
Full path where PKI backend is mounted.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuer#backend DataVaultPkiSecretBackendIssuer#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuer#backend DataVaultPkiSecretBackendIssuer#backend}
---
@@ -850,7 +850,7 @@ public readonly issuerRef: string;
Reference to an existing issuer.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuer#issuer_ref DataVaultPkiSecretBackendIssuer#issuer_ref}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuer#issuer_ref DataVaultPkiSecretBackendIssuer#issuer_ref}
---
@@ -862,7 +862,7 @@ public readonly id: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuer#id DataVaultPkiSecretBackendIssuer#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuer#id DataVaultPkiSecretBackendIssuer#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -879,7 +879,7 @@ public readonly namespace: string;
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuer#namespace DataVaultPkiSecretBackendIssuer#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuer#namespace DataVaultPkiSecretBackendIssuer#namespace}
---
diff --git a/docs/dataVaultPkiSecretBackendIssuers.csharp.md b/docs/dataVaultPkiSecretBackendIssuers.csharp.md
index 9db47e2a..cb06d38c 100644
--- a/docs/dataVaultPkiSecretBackendIssuers.csharp.md
+++ b/docs/dataVaultPkiSecretBackendIssuers.csharp.md
@@ -4,7 +4,7 @@
### DataVaultPkiSecretBackendIssuers
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuers vault_pki_secret_backend_issuers}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuers vault_pki_secret_backend_issuers}.
#### Initializers
@@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultPkiSecretBackendI
The id of the existing DataVaultPkiSecretBackendIssuers that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuers#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuers#import import section} in the documentation of this resource for the id to use
---
@@ -684,7 +684,7 @@ new DataVaultPkiSecretBackendIssuersConfig {
| Provider
| HashiCorp.Cdktf.TerraformProvider
| *No description.* |
| Provisioners
| object[]
| *No description.* |
| Backend
| string
| Full path where PKI backend is mounted. |
-| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuers#id DataVaultPkiSecretBackendIssuers#id}. |
+| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuers#id DataVaultPkiSecretBackendIssuers#id}. |
| Namespace
| string
| Target namespace. (requires Enterprise). |
---
@@ -769,7 +769,7 @@ public string Backend { get; set; }
Full path where PKI backend is mounted.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuers#backend DataVaultPkiSecretBackendIssuers#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuers#backend DataVaultPkiSecretBackendIssuers#backend}
---
@@ -781,7 +781,7 @@ public string Id { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuers#id DataVaultPkiSecretBackendIssuers#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuers#id DataVaultPkiSecretBackendIssuers#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -798,7 +798,7 @@ public string Namespace { get; set; }
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuers#namespace DataVaultPkiSecretBackendIssuers#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuers#namespace DataVaultPkiSecretBackendIssuers#namespace}
---
diff --git a/docs/dataVaultPkiSecretBackendIssuers.go.md b/docs/dataVaultPkiSecretBackendIssuers.go.md
index 4630cd1f..581bccc2 100644
--- a/docs/dataVaultPkiSecretBackendIssuers.go.md
+++ b/docs/dataVaultPkiSecretBackendIssuers.go.md
@@ -4,7 +4,7 @@
### DataVaultPkiSecretBackendIssuers
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuers vault_pki_secret_backend_issuers}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuers vault_pki_secret_backend_issuers}.
#### Initializers
@@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultPkiSecretBackendI
The id of the existing DataVaultPkiSecretBackendIssuers that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuers#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuers#import import section} in the documentation of this resource for the id to use
---
@@ -684,7 +684,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultpkisecretbac
| Provider
| github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProvider
| *No description.* |
| Provisioners
| *[]interface{}
| *No description.* |
| Backend
| *string
| Full path where PKI backend is mounted. |
-| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuers#id DataVaultPkiSecretBackendIssuers#id}. |
+| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuers#id DataVaultPkiSecretBackendIssuers#id}. |
| Namespace
| *string
| Target namespace. (requires Enterprise). |
---
@@ -769,7 +769,7 @@ Backend *string
Full path where PKI backend is mounted.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuers#backend DataVaultPkiSecretBackendIssuers#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuers#backend DataVaultPkiSecretBackendIssuers#backend}
---
@@ -781,7 +781,7 @@ Id *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuers#id DataVaultPkiSecretBackendIssuers#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuers#id DataVaultPkiSecretBackendIssuers#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -798,7 +798,7 @@ Namespace *string
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuers#namespace DataVaultPkiSecretBackendIssuers#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuers#namespace DataVaultPkiSecretBackendIssuers#namespace}
---
diff --git a/docs/dataVaultPkiSecretBackendIssuers.java.md b/docs/dataVaultPkiSecretBackendIssuers.java.md
index 9768419a..1560f205 100644
--- a/docs/dataVaultPkiSecretBackendIssuers.java.md
+++ b/docs/dataVaultPkiSecretBackendIssuers.java.md
@@ -4,7 +4,7 @@
### DataVaultPkiSecretBackendIssuers
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuers vault_pki_secret_backend_issuers}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuers vault_pki_secret_backend_issuers}.
#### Initializers
@@ -41,7 +41,7 @@ DataVaultPkiSecretBackendIssuers.Builder.create(Construct scope, java.lang.Strin
| provider
| com.hashicorp.cdktf.TerraformProvider
| *No description.* |
| provisioners
| java.util.List
| *No description.* |
| backend
| java.lang.String
| Full path where PKI backend is mounted. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuers#id DataVaultPkiSecretBackendIssuers#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuers#id DataVaultPkiSecretBackendIssuers#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
---
@@ -112,7 +112,7 @@ Must be unique amongst siblings in the same scope
Full path where PKI backend is mounted.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuers#backend DataVaultPkiSecretBackendIssuers#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuers#backend DataVaultPkiSecretBackendIssuers#backend}
---
@@ -120,7 +120,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuers#id DataVaultPkiSecretBackendIssuers#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuers#id DataVaultPkiSecretBackendIssuers#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -133,7 +133,7 @@ If you experience problems setting this value it might not be settable. Please t
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuers#namespace DataVaultPkiSecretBackendIssuers#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuers#namespace DataVaultPkiSecretBackendIssuers#namespace}
---
@@ -470,7 +470,7 @@ The construct id used in the generated config for the DataVaultPkiSecretBackendI
The id of the existing DataVaultPkiSecretBackendIssuers that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuers#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuers#import import section} in the documentation of this resource for the id to use
---
@@ -779,7 +779,7 @@ DataVaultPkiSecretBackendIssuersConfig.builder()
| provider
| com.hashicorp.cdktf.TerraformProvider
| *No description.* |
| provisioners
| java.util.List
| *No description.* |
| backend
| java.lang.String
| Full path where PKI backend is mounted. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuers#id DataVaultPkiSecretBackendIssuers#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuers#id DataVaultPkiSecretBackendIssuers#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
---
@@ -864,7 +864,7 @@ public java.lang.String getBackend();
Full path where PKI backend is mounted.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuers#backend DataVaultPkiSecretBackendIssuers#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuers#backend DataVaultPkiSecretBackendIssuers#backend}
---
@@ -876,7 +876,7 @@ public java.lang.String getId();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuers#id DataVaultPkiSecretBackendIssuers#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuers#id DataVaultPkiSecretBackendIssuers#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -893,7 +893,7 @@ public java.lang.String getNamespace();
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuers#namespace DataVaultPkiSecretBackendIssuers#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuers#namespace DataVaultPkiSecretBackendIssuers#namespace}
---
diff --git a/docs/dataVaultPkiSecretBackendIssuers.python.md b/docs/dataVaultPkiSecretBackendIssuers.python.md
index 569be48b..a1eba22d 100644
--- a/docs/dataVaultPkiSecretBackendIssuers.python.md
+++ b/docs/dataVaultPkiSecretBackendIssuers.python.md
@@ -4,7 +4,7 @@
### DataVaultPkiSecretBackendIssuers
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuers vault_pki_secret_backend_issuers}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuers vault_pki_secret_backend_issuers}.
#### Initializers
@@ -39,7 +39,7 @@ dataVaultPkiSecretBackendIssuers.DataVaultPkiSecretBackendIssuers(
| provider
| cdktf.TerraformProvider
| *No description.* |
| provisioners
| typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]]
| *No description.* |
| backend
| str
| Full path where PKI backend is mounted. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuers#id DataVaultPkiSecretBackendIssuers#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuers#id DataVaultPkiSecretBackendIssuers#id}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
---
@@ -110,7 +110,7 @@ Must be unique amongst siblings in the same scope
Full path where PKI backend is mounted.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuers#backend DataVaultPkiSecretBackendIssuers#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuers#backend DataVaultPkiSecretBackendIssuers#backend}
---
@@ -118,7 +118,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuers#id DataVaultPkiSecretBackendIssuers#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuers#id DataVaultPkiSecretBackendIssuers#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -131,7 +131,7 @@ If you experience problems setting this value it might not be settable. Please t
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuers#namespace DataVaultPkiSecretBackendIssuers#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuers#namespace DataVaultPkiSecretBackendIssuers#namespace}
---
@@ -504,7 +504,7 @@ The construct id used in the generated config for the DataVaultPkiSecretBackendI
The id of the existing DataVaultPkiSecretBackendIssuers that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuers#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuers#import import section} in the documentation of this resource for the id to use
---
@@ -809,7 +809,7 @@ dataVaultPkiSecretBackendIssuers.DataVaultPkiSecretBackendIssuersConfig(
| provider
| cdktf.TerraformProvider
| *No description.* |
| provisioners
| typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]]
| *No description.* |
| backend
| str
| Full path where PKI backend is mounted. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuers#id DataVaultPkiSecretBackendIssuers#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuers#id DataVaultPkiSecretBackendIssuers#id}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
---
@@ -894,7 +894,7 @@ backend: str
Full path where PKI backend is mounted.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuers#backend DataVaultPkiSecretBackendIssuers#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuers#backend DataVaultPkiSecretBackendIssuers#backend}
---
@@ -906,7 +906,7 @@ id: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuers#id DataVaultPkiSecretBackendIssuers#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuers#id DataVaultPkiSecretBackendIssuers#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -923,7 +923,7 @@ namespace: str
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuers#namespace DataVaultPkiSecretBackendIssuers#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuers#namespace DataVaultPkiSecretBackendIssuers#namespace}
---
diff --git a/docs/dataVaultPkiSecretBackendIssuers.typescript.md b/docs/dataVaultPkiSecretBackendIssuers.typescript.md
index 2f1472bf..6035666d 100644
--- a/docs/dataVaultPkiSecretBackendIssuers.typescript.md
+++ b/docs/dataVaultPkiSecretBackendIssuers.typescript.md
@@ -4,7 +4,7 @@
### DataVaultPkiSecretBackendIssuers
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuers vault_pki_secret_backend_issuers}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuers vault_pki_secret_backend_issuers}.
#### Initializers
@@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultPkiSecretBackendI
The id of the existing DataVaultPkiSecretBackendIssuers that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuers#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuers#import import section} in the documentation of this resource for the id to use
---
@@ -673,7 +673,7 @@ const dataVaultPkiSecretBackendIssuersConfig: dataVaultPkiSecretBackendIssuers.D
| provider
| cdktf.TerraformProvider
| *No description.* |
| provisioners
| cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[]
| *No description.* |
| backend
| string
| Full path where PKI backend is mounted. |
-| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuers#id DataVaultPkiSecretBackendIssuers#id}. |
+| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuers#id DataVaultPkiSecretBackendIssuers#id}. |
| namespace
| string
| Target namespace. (requires Enterprise). |
---
@@ -758,7 +758,7 @@ public readonly backend: string;
Full path where PKI backend is mounted.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuers#backend DataVaultPkiSecretBackendIssuers#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuers#backend DataVaultPkiSecretBackendIssuers#backend}
---
@@ -770,7 +770,7 @@ public readonly id: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuers#id DataVaultPkiSecretBackendIssuers#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuers#id DataVaultPkiSecretBackendIssuers#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -787,7 +787,7 @@ public readonly namespace: string;
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuers#namespace DataVaultPkiSecretBackendIssuers#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuers#namespace DataVaultPkiSecretBackendIssuers#namespace}
---
diff --git a/docs/dataVaultPkiSecretBackendKey.csharp.md b/docs/dataVaultPkiSecretBackendKey.csharp.md
index af02de8e..9f49d55a 100644
--- a/docs/dataVaultPkiSecretBackendKey.csharp.md
+++ b/docs/dataVaultPkiSecretBackendKey.csharp.md
@@ -4,7 +4,7 @@
### DataVaultPkiSecretBackendKey
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_key vault_pki_secret_backend_key}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_key vault_pki_secret_backend_key}.
#### Initializers
@@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultPkiSecretBackendK
The id of the existing DataVaultPkiSecretBackendKey that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_key#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_key#import import section} in the documentation of this resource for the id to use
---
@@ -708,7 +708,7 @@ new DataVaultPkiSecretBackendKeyConfig {
| Provisioners
| object[]
| *No description.* |
| Backend
| string
| Full path where PKI backend is mounted. |
| KeyRef
| string
| Reference to an existing key. |
-| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_key#id DataVaultPkiSecretBackendKey#id}. |
+| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_key#id DataVaultPkiSecretBackendKey#id}. |
| Namespace
| string
| Target namespace. (requires Enterprise). |
---
@@ -793,7 +793,7 @@ public string Backend { get; set; }
Full path where PKI backend is mounted.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_key#backend DataVaultPkiSecretBackendKey#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_key#backend DataVaultPkiSecretBackendKey#backend}
---
@@ -807,7 +807,7 @@ public string KeyRef { get; set; }
Reference to an existing key.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_key#key_ref DataVaultPkiSecretBackendKey#key_ref}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_key#key_ref DataVaultPkiSecretBackendKey#key_ref}
---
@@ -819,7 +819,7 @@ public string Id { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_key#id DataVaultPkiSecretBackendKey#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_key#id DataVaultPkiSecretBackendKey#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -836,7 +836,7 @@ public string Namespace { get; set; }
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_key#namespace DataVaultPkiSecretBackendKey#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_key#namespace DataVaultPkiSecretBackendKey#namespace}
---
diff --git a/docs/dataVaultPkiSecretBackendKey.go.md b/docs/dataVaultPkiSecretBackendKey.go.md
index f3dff06b..c676f23e 100644
--- a/docs/dataVaultPkiSecretBackendKey.go.md
+++ b/docs/dataVaultPkiSecretBackendKey.go.md
@@ -4,7 +4,7 @@
### DataVaultPkiSecretBackendKey
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_key vault_pki_secret_backend_key}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_key vault_pki_secret_backend_key}.
#### Initializers
@@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultPkiSecretBackendK
The id of the existing DataVaultPkiSecretBackendKey that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_key#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_key#import import section} in the documentation of this resource for the id to use
---
@@ -708,7 +708,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultpkisecretbac
| Provisioners
| *[]interface{}
| *No description.* |
| Backend
| *string
| Full path where PKI backend is mounted. |
| KeyRef
| *string
| Reference to an existing key. |
-| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_key#id DataVaultPkiSecretBackendKey#id}. |
+| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_key#id DataVaultPkiSecretBackendKey#id}. |
| Namespace
| *string
| Target namespace. (requires Enterprise). |
---
@@ -793,7 +793,7 @@ Backend *string
Full path where PKI backend is mounted.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_key#backend DataVaultPkiSecretBackendKey#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_key#backend DataVaultPkiSecretBackendKey#backend}
---
@@ -807,7 +807,7 @@ KeyRef *string
Reference to an existing key.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_key#key_ref DataVaultPkiSecretBackendKey#key_ref}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_key#key_ref DataVaultPkiSecretBackendKey#key_ref}
---
@@ -819,7 +819,7 @@ Id *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_key#id DataVaultPkiSecretBackendKey#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_key#id DataVaultPkiSecretBackendKey#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -836,7 +836,7 @@ Namespace *string
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_key#namespace DataVaultPkiSecretBackendKey#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_key#namespace DataVaultPkiSecretBackendKey#namespace}
---
diff --git a/docs/dataVaultPkiSecretBackendKey.java.md b/docs/dataVaultPkiSecretBackendKey.java.md
index 069dd12f..098ae618 100644
--- a/docs/dataVaultPkiSecretBackendKey.java.md
+++ b/docs/dataVaultPkiSecretBackendKey.java.md
@@ -4,7 +4,7 @@
### DataVaultPkiSecretBackendKey
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_key vault_pki_secret_backend_key}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_key vault_pki_secret_backend_key}.
#### Initializers
@@ -43,7 +43,7 @@ DataVaultPkiSecretBackendKey.Builder.create(Construct scope, java.lang.String id
| provisioners
| java.util.List
| *No description.* |
| backend
| java.lang.String
| Full path where PKI backend is mounted. |
| keyRef
| java.lang.String
| Reference to an existing key. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_key#id DataVaultPkiSecretBackendKey#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_key#id DataVaultPkiSecretBackendKey#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
---
@@ -114,7 +114,7 @@ Must be unique amongst siblings in the same scope
Full path where PKI backend is mounted.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_key#backend DataVaultPkiSecretBackendKey#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_key#backend DataVaultPkiSecretBackendKey#backend}
---
@@ -124,7 +124,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Reference to an existing key.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_key#key_ref DataVaultPkiSecretBackendKey#key_ref}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_key#key_ref DataVaultPkiSecretBackendKey#key_ref}
---
@@ -132,7 +132,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_key#id DataVaultPkiSecretBackendKey#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_key#id DataVaultPkiSecretBackendKey#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -145,7 +145,7 @@ If you experience problems setting this value it might not be settable. Please t
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_key#namespace DataVaultPkiSecretBackendKey#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_key#namespace DataVaultPkiSecretBackendKey#namespace}
---
@@ -482,7 +482,7 @@ The construct id used in the generated config for the DataVaultPkiSecretBackendK
The id of the existing DataVaultPkiSecretBackendKey that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_key#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_key#import import section} in the documentation of this resource for the id to use
---
@@ -815,7 +815,7 @@ DataVaultPkiSecretBackendKeyConfig.builder()
| provisioners
| java.util.List
| *No description.* |
| backend
| java.lang.String
| Full path where PKI backend is mounted. |
| keyRef
| java.lang.String
| Reference to an existing key. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_key#id DataVaultPkiSecretBackendKey#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_key#id DataVaultPkiSecretBackendKey#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
---
@@ -900,7 +900,7 @@ public java.lang.String getBackend();
Full path where PKI backend is mounted.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_key#backend DataVaultPkiSecretBackendKey#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_key#backend DataVaultPkiSecretBackendKey#backend}
---
@@ -914,7 +914,7 @@ public java.lang.String getKeyRef();
Reference to an existing key.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_key#key_ref DataVaultPkiSecretBackendKey#key_ref}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_key#key_ref DataVaultPkiSecretBackendKey#key_ref}
---
@@ -926,7 +926,7 @@ public java.lang.String getId();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_key#id DataVaultPkiSecretBackendKey#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_key#id DataVaultPkiSecretBackendKey#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -943,7 +943,7 @@ public java.lang.String getNamespace();
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_key#namespace DataVaultPkiSecretBackendKey#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_key#namespace DataVaultPkiSecretBackendKey#namespace}
---
diff --git a/docs/dataVaultPkiSecretBackendKey.python.md b/docs/dataVaultPkiSecretBackendKey.python.md
index a349bf5f..c3c57efc 100644
--- a/docs/dataVaultPkiSecretBackendKey.python.md
+++ b/docs/dataVaultPkiSecretBackendKey.python.md
@@ -4,7 +4,7 @@
### DataVaultPkiSecretBackendKey
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_key vault_pki_secret_backend_key}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_key vault_pki_secret_backend_key}.
#### Initializers
@@ -41,7 +41,7 @@ dataVaultPkiSecretBackendKey.DataVaultPkiSecretBackendKey(
| provisioners
| typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]]
| *No description.* |
| backend
| str
| Full path where PKI backend is mounted. |
| key_ref
| str
| Reference to an existing key. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_key#id DataVaultPkiSecretBackendKey#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_key#id DataVaultPkiSecretBackendKey#id}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
---
@@ -112,7 +112,7 @@ Must be unique amongst siblings in the same scope
Full path where PKI backend is mounted.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_key#backend DataVaultPkiSecretBackendKey#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_key#backend DataVaultPkiSecretBackendKey#backend}
---
@@ -122,7 +122,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Reference to an existing key.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_key#key_ref DataVaultPkiSecretBackendKey#key_ref}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_key#key_ref DataVaultPkiSecretBackendKey#key_ref}
---
@@ -130,7 +130,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_key#id DataVaultPkiSecretBackendKey#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_key#id DataVaultPkiSecretBackendKey#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -143,7 +143,7 @@ If you experience problems setting this value it might not be settable. Please t
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_key#namespace DataVaultPkiSecretBackendKey#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_key#namespace DataVaultPkiSecretBackendKey#namespace}
---
@@ -516,7 +516,7 @@ The construct id used in the generated config for the DataVaultPkiSecretBackendK
The id of the existing DataVaultPkiSecretBackendKey that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_key#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_key#import import section} in the documentation of this resource for the id to use
---
@@ -845,7 +845,7 @@ dataVaultPkiSecretBackendKey.DataVaultPkiSecretBackendKeyConfig(
| provisioners
| typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]]
| *No description.* |
| backend
| str
| Full path where PKI backend is mounted. |
| key_ref
| str
| Reference to an existing key. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_key#id DataVaultPkiSecretBackendKey#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_key#id DataVaultPkiSecretBackendKey#id}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
---
@@ -930,7 +930,7 @@ backend: str
Full path where PKI backend is mounted.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_key#backend DataVaultPkiSecretBackendKey#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_key#backend DataVaultPkiSecretBackendKey#backend}
---
@@ -944,7 +944,7 @@ key_ref: str
Reference to an existing key.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_key#key_ref DataVaultPkiSecretBackendKey#key_ref}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_key#key_ref DataVaultPkiSecretBackendKey#key_ref}
---
@@ -956,7 +956,7 @@ id: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_key#id DataVaultPkiSecretBackendKey#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_key#id DataVaultPkiSecretBackendKey#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -973,7 +973,7 @@ namespace: str
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_key#namespace DataVaultPkiSecretBackendKey#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_key#namespace DataVaultPkiSecretBackendKey#namespace}
---
diff --git a/docs/dataVaultPkiSecretBackendKey.typescript.md b/docs/dataVaultPkiSecretBackendKey.typescript.md
index ed8e49cb..df7c4c7e 100644
--- a/docs/dataVaultPkiSecretBackendKey.typescript.md
+++ b/docs/dataVaultPkiSecretBackendKey.typescript.md
@@ -4,7 +4,7 @@
### DataVaultPkiSecretBackendKey
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_key vault_pki_secret_backend_key}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_key vault_pki_secret_backend_key}.
#### Initializers
@@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultPkiSecretBackendK
The id of the existing DataVaultPkiSecretBackendKey that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_key#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_key#import import section} in the documentation of this resource for the id to use
---
@@ -696,7 +696,7 @@ const dataVaultPkiSecretBackendKeyConfig: dataVaultPkiSecretBackendKey.DataVault
| provisioners
| cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[]
| *No description.* |
| backend
| string
| Full path where PKI backend is mounted. |
| keyRef
| string
| Reference to an existing key. |
-| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_key#id DataVaultPkiSecretBackendKey#id}. |
+| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_key#id DataVaultPkiSecretBackendKey#id}. |
| namespace
| string
| Target namespace. (requires Enterprise). |
---
@@ -781,7 +781,7 @@ public readonly backend: string;
Full path where PKI backend is mounted.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_key#backend DataVaultPkiSecretBackendKey#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_key#backend DataVaultPkiSecretBackendKey#backend}
---
@@ -795,7 +795,7 @@ public readonly keyRef: string;
Reference to an existing key.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_key#key_ref DataVaultPkiSecretBackendKey#key_ref}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_key#key_ref DataVaultPkiSecretBackendKey#key_ref}
---
@@ -807,7 +807,7 @@ public readonly id: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_key#id DataVaultPkiSecretBackendKey#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_key#id DataVaultPkiSecretBackendKey#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -824,7 +824,7 @@ public readonly namespace: string;
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_key#namespace DataVaultPkiSecretBackendKey#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_key#namespace DataVaultPkiSecretBackendKey#namespace}
---
diff --git a/docs/dataVaultPkiSecretBackendKeys.csharp.md b/docs/dataVaultPkiSecretBackendKeys.csharp.md
index ad2af80c..c9c3aca5 100644
--- a/docs/dataVaultPkiSecretBackendKeys.csharp.md
+++ b/docs/dataVaultPkiSecretBackendKeys.csharp.md
@@ -4,7 +4,7 @@
### DataVaultPkiSecretBackendKeys
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_keys vault_pki_secret_backend_keys}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_keys vault_pki_secret_backend_keys}.
#### Initializers
@@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultPkiSecretBackendK
The id of the existing DataVaultPkiSecretBackendKeys that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_keys#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_keys#import import section} in the documentation of this resource for the id to use
---
@@ -684,7 +684,7 @@ new DataVaultPkiSecretBackendKeysConfig {
| Provider
| HashiCorp.Cdktf.TerraformProvider
| *No description.* |
| Provisioners
| object[]
| *No description.* |
| Backend
| string
| Full path where PKI backend is mounted. |
-| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_keys#id DataVaultPkiSecretBackendKeys#id}. |
+| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_keys#id DataVaultPkiSecretBackendKeys#id}. |
| Namespace
| string
| Target namespace. (requires Enterprise). |
---
@@ -769,7 +769,7 @@ public string Backend { get; set; }
Full path where PKI backend is mounted.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_keys#backend DataVaultPkiSecretBackendKeys#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_keys#backend DataVaultPkiSecretBackendKeys#backend}
---
@@ -781,7 +781,7 @@ public string Id { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_keys#id DataVaultPkiSecretBackendKeys#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_keys#id DataVaultPkiSecretBackendKeys#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -798,7 +798,7 @@ public string Namespace { get; set; }
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_keys#namespace DataVaultPkiSecretBackendKeys#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_keys#namespace DataVaultPkiSecretBackendKeys#namespace}
---
diff --git a/docs/dataVaultPkiSecretBackendKeys.go.md b/docs/dataVaultPkiSecretBackendKeys.go.md
index 163580da..0cf1d2e9 100644
--- a/docs/dataVaultPkiSecretBackendKeys.go.md
+++ b/docs/dataVaultPkiSecretBackendKeys.go.md
@@ -4,7 +4,7 @@
### DataVaultPkiSecretBackendKeys
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_keys vault_pki_secret_backend_keys}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_keys vault_pki_secret_backend_keys}.
#### Initializers
@@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultPkiSecretBackendK
The id of the existing DataVaultPkiSecretBackendKeys that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_keys#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_keys#import import section} in the documentation of this resource for the id to use
---
@@ -684,7 +684,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultpkisecretbac
| Provider
| github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProvider
| *No description.* |
| Provisioners
| *[]interface{}
| *No description.* |
| Backend
| *string
| Full path where PKI backend is mounted. |
-| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_keys#id DataVaultPkiSecretBackendKeys#id}. |
+| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_keys#id DataVaultPkiSecretBackendKeys#id}. |
| Namespace
| *string
| Target namespace. (requires Enterprise). |
---
@@ -769,7 +769,7 @@ Backend *string
Full path where PKI backend is mounted.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_keys#backend DataVaultPkiSecretBackendKeys#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_keys#backend DataVaultPkiSecretBackendKeys#backend}
---
@@ -781,7 +781,7 @@ Id *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_keys#id DataVaultPkiSecretBackendKeys#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_keys#id DataVaultPkiSecretBackendKeys#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -798,7 +798,7 @@ Namespace *string
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_keys#namespace DataVaultPkiSecretBackendKeys#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_keys#namespace DataVaultPkiSecretBackendKeys#namespace}
---
diff --git a/docs/dataVaultPkiSecretBackendKeys.java.md b/docs/dataVaultPkiSecretBackendKeys.java.md
index 1d02c389..019bbacc 100644
--- a/docs/dataVaultPkiSecretBackendKeys.java.md
+++ b/docs/dataVaultPkiSecretBackendKeys.java.md
@@ -4,7 +4,7 @@
### DataVaultPkiSecretBackendKeys
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_keys vault_pki_secret_backend_keys}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_keys vault_pki_secret_backend_keys}.
#### Initializers
@@ -41,7 +41,7 @@ DataVaultPkiSecretBackendKeys.Builder.create(Construct scope, java.lang.String i
| provider
| com.hashicorp.cdktf.TerraformProvider
| *No description.* |
| provisioners
| java.util.List
| *No description.* |
| backend
| java.lang.String
| Full path where PKI backend is mounted. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_keys#id DataVaultPkiSecretBackendKeys#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_keys#id DataVaultPkiSecretBackendKeys#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
---
@@ -112,7 +112,7 @@ Must be unique amongst siblings in the same scope
Full path where PKI backend is mounted.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_keys#backend DataVaultPkiSecretBackendKeys#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_keys#backend DataVaultPkiSecretBackendKeys#backend}
---
@@ -120,7 +120,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_keys#id DataVaultPkiSecretBackendKeys#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_keys#id DataVaultPkiSecretBackendKeys#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -133,7 +133,7 @@ If you experience problems setting this value it might not be settable. Please t
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_keys#namespace DataVaultPkiSecretBackendKeys#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_keys#namespace DataVaultPkiSecretBackendKeys#namespace}
---
@@ -470,7 +470,7 @@ The construct id used in the generated config for the DataVaultPkiSecretBackendK
The id of the existing DataVaultPkiSecretBackendKeys that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_keys#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_keys#import import section} in the documentation of this resource for the id to use
---
@@ -779,7 +779,7 @@ DataVaultPkiSecretBackendKeysConfig.builder()
| provider
| com.hashicorp.cdktf.TerraformProvider
| *No description.* |
| provisioners
| java.util.List
| *No description.* |
| backend
| java.lang.String
| Full path where PKI backend is mounted. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_keys#id DataVaultPkiSecretBackendKeys#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_keys#id DataVaultPkiSecretBackendKeys#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
---
@@ -864,7 +864,7 @@ public java.lang.String getBackend();
Full path where PKI backend is mounted.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_keys#backend DataVaultPkiSecretBackendKeys#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_keys#backend DataVaultPkiSecretBackendKeys#backend}
---
@@ -876,7 +876,7 @@ public java.lang.String getId();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_keys#id DataVaultPkiSecretBackendKeys#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_keys#id DataVaultPkiSecretBackendKeys#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -893,7 +893,7 @@ public java.lang.String getNamespace();
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_keys#namespace DataVaultPkiSecretBackendKeys#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_keys#namespace DataVaultPkiSecretBackendKeys#namespace}
---
diff --git a/docs/dataVaultPkiSecretBackendKeys.python.md b/docs/dataVaultPkiSecretBackendKeys.python.md
index 63bfe7b6..512c98fa 100644
--- a/docs/dataVaultPkiSecretBackendKeys.python.md
+++ b/docs/dataVaultPkiSecretBackendKeys.python.md
@@ -4,7 +4,7 @@
### DataVaultPkiSecretBackendKeys
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_keys vault_pki_secret_backend_keys}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_keys vault_pki_secret_backend_keys}.
#### Initializers
@@ -39,7 +39,7 @@ dataVaultPkiSecretBackendKeys.DataVaultPkiSecretBackendKeys(
| provider
| cdktf.TerraformProvider
| *No description.* |
| provisioners
| typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]]
| *No description.* |
| backend
| str
| Full path where PKI backend is mounted. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_keys#id DataVaultPkiSecretBackendKeys#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_keys#id DataVaultPkiSecretBackendKeys#id}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
---
@@ -110,7 +110,7 @@ Must be unique amongst siblings in the same scope
Full path where PKI backend is mounted.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_keys#backend DataVaultPkiSecretBackendKeys#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_keys#backend DataVaultPkiSecretBackendKeys#backend}
---
@@ -118,7 +118,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_keys#id DataVaultPkiSecretBackendKeys#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_keys#id DataVaultPkiSecretBackendKeys#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -131,7 +131,7 @@ If you experience problems setting this value it might not be settable. Please t
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_keys#namespace DataVaultPkiSecretBackendKeys#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_keys#namespace DataVaultPkiSecretBackendKeys#namespace}
---
@@ -504,7 +504,7 @@ The construct id used in the generated config for the DataVaultPkiSecretBackendK
The id of the existing DataVaultPkiSecretBackendKeys that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_keys#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_keys#import import section} in the documentation of this resource for the id to use
---
@@ -809,7 +809,7 @@ dataVaultPkiSecretBackendKeys.DataVaultPkiSecretBackendKeysConfig(
| provider
| cdktf.TerraformProvider
| *No description.* |
| provisioners
| typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]]
| *No description.* |
| backend
| str
| Full path where PKI backend is mounted. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_keys#id DataVaultPkiSecretBackendKeys#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_keys#id DataVaultPkiSecretBackendKeys#id}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
---
@@ -894,7 +894,7 @@ backend: str
Full path where PKI backend is mounted.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_keys#backend DataVaultPkiSecretBackendKeys#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_keys#backend DataVaultPkiSecretBackendKeys#backend}
---
@@ -906,7 +906,7 @@ id: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_keys#id DataVaultPkiSecretBackendKeys#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_keys#id DataVaultPkiSecretBackendKeys#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -923,7 +923,7 @@ namespace: str
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_keys#namespace DataVaultPkiSecretBackendKeys#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_keys#namespace DataVaultPkiSecretBackendKeys#namespace}
---
diff --git a/docs/dataVaultPkiSecretBackendKeys.typescript.md b/docs/dataVaultPkiSecretBackendKeys.typescript.md
index 62df36e9..794a38f9 100644
--- a/docs/dataVaultPkiSecretBackendKeys.typescript.md
+++ b/docs/dataVaultPkiSecretBackendKeys.typescript.md
@@ -4,7 +4,7 @@
### DataVaultPkiSecretBackendKeys
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_keys vault_pki_secret_backend_keys}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_keys vault_pki_secret_backend_keys}.
#### Initializers
@@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultPkiSecretBackendK
The id of the existing DataVaultPkiSecretBackendKeys that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_keys#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_keys#import import section} in the documentation of this resource for the id to use
---
@@ -673,7 +673,7 @@ const dataVaultPkiSecretBackendKeysConfig: dataVaultPkiSecretBackendKeys.DataVau
| provider
| cdktf.TerraformProvider
| *No description.* |
| provisioners
| cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[]
| *No description.* |
| backend
| string
| Full path where PKI backend is mounted. |
-| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_keys#id DataVaultPkiSecretBackendKeys#id}. |
+| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_keys#id DataVaultPkiSecretBackendKeys#id}. |
| namespace
| string
| Target namespace. (requires Enterprise). |
---
@@ -758,7 +758,7 @@ public readonly backend: string;
Full path where PKI backend is mounted.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_keys#backend DataVaultPkiSecretBackendKeys#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_keys#backend DataVaultPkiSecretBackendKeys#backend}
---
@@ -770,7 +770,7 @@ public readonly id: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_keys#id DataVaultPkiSecretBackendKeys#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_keys#id DataVaultPkiSecretBackendKeys#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -787,7 +787,7 @@ public readonly namespace: string;
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_keys#namespace DataVaultPkiSecretBackendKeys#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_keys#namespace DataVaultPkiSecretBackendKeys#namespace}
---
diff --git a/docs/dataVaultPolicyDocument.csharp.md b/docs/dataVaultPolicyDocument.csharp.md
index 764bcfb3..378448b8 100644
--- a/docs/dataVaultPolicyDocument.csharp.md
+++ b/docs/dataVaultPolicyDocument.csharp.md
@@ -4,7 +4,7 @@
### DataVaultPolicyDocument
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document vault_policy_document}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document vault_policy_document}.
#### Initializers
@@ -399,7 +399,7 @@ The construct id used in the generated config for the DataVaultPolicyDocument to
The id of the existing DataVaultPolicyDocument that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#import import section} in the documentation of this resource for the id to use
---
@@ -681,7 +681,7 @@ new DataVaultPolicyDocumentConfig {
| Lifecycle
| HashiCorp.Cdktf.TerraformResourceLifecycle
| *No description.* |
| Provider
| HashiCorp.Cdktf.TerraformProvider
| *No description.* |
| Provisioners
| object[]
| *No description.* |
-| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#id DataVaultPolicyDocument#id}. |
+| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#id DataVaultPolicyDocument#id}. |
| Namespace
| string
| Target namespace. (requires Enterprise). |
| Rule
| object
| rule block. |
@@ -765,7 +765,7 @@ public string Id { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#id DataVaultPolicyDocument#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#id DataVaultPolicyDocument#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -782,7 +782,7 @@ public string Namespace { get; set; }
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#namespace DataVaultPolicyDocument#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#namespace DataVaultPolicyDocument#namespace}
---
@@ -796,7 +796,7 @@ public object Rule { get; set; }
rule block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#rule DataVaultPolicyDocument#rule}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#rule DataVaultPolicyDocument#rule}
---
@@ -823,14 +823,14 @@ new DataVaultPolicyDocumentRule {
| **Name** | **Type** | **Description** |
| --- | --- | --- |
-| Capabilities
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#capabilities DataVaultPolicyDocument#capabilities}. |
-| Path
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#path DataVaultPolicyDocument#path}. |
+| Capabilities
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#capabilities DataVaultPolicyDocument#capabilities}. |
+| Path
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#path DataVaultPolicyDocument#path}. |
| AllowedParameter
| object
| allowed_parameter block. |
| DeniedParameter
| object
| denied_parameter block. |
-| Description
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#description DataVaultPolicyDocument#description}. |
-| MaxWrappingTtl
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#max_wrapping_ttl DataVaultPolicyDocument#max_wrapping_ttl}. |
-| MinWrappingTtl
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#min_wrapping_ttl DataVaultPolicyDocument#min_wrapping_ttl}. |
-| RequiredParameters
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#required_parameters DataVaultPolicyDocument#required_parameters}. |
+| Description
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#description DataVaultPolicyDocument#description}. |
+| MaxWrappingTtl
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#max_wrapping_ttl DataVaultPolicyDocument#max_wrapping_ttl}. |
+| MinWrappingTtl
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#min_wrapping_ttl DataVaultPolicyDocument#min_wrapping_ttl}. |
+| RequiredParameters
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#required_parameters DataVaultPolicyDocument#required_parameters}. |
---
@@ -842,7 +842,7 @@ public string[] Capabilities { get; set; }
- *Type:* string[]
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#capabilities DataVaultPolicyDocument#capabilities}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#capabilities DataVaultPolicyDocument#capabilities}.
---
@@ -854,7 +854,7 @@ public string Path { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#path DataVaultPolicyDocument#path}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#path DataVaultPolicyDocument#path}.
---
@@ -868,7 +868,7 @@ public object AllowedParameter { get; set; }
allowed_parameter block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#allowed_parameter DataVaultPolicyDocument#allowed_parameter}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#allowed_parameter DataVaultPolicyDocument#allowed_parameter}
---
@@ -882,7 +882,7 @@ public object DeniedParameter { get; set; }
denied_parameter block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#denied_parameter DataVaultPolicyDocument#denied_parameter}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#denied_parameter DataVaultPolicyDocument#denied_parameter}
---
@@ -894,7 +894,7 @@ public string Description { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#description DataVaultPolicyDocument#description}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#description DataVaultPolicyDocument#description}.
---
@@ -906,7 +906,7 @@ public string MaxWrappingTtl { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#max_wrapping_ttl DataVaultPolicyDocument#max_wrapping_ttl}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#max_wrapping_ttl DataVaultPolicyDocument#max_wrapping_ttl}.
---
@@ -918,7 +918,7 @@ public string MinWrappingTtl { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#min_wrapping_ttl DataVaultPolicyDocument#min_wrapping_ttl}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#min_wrapping_ttl DataVaultPolicyDocument#min_wrapping_ttl}.
---
@@ -930,7 +930,7 @@ public string[] RequiredParameters { get; set; }
- *Type:* string[]
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#required_parameters DataVaultPolicyDocument#required_parameters}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#required_parameters DataVaultPolicyDocument#required_parameters}.
---
@@ -951,8 +951,8 @@ new DataVaultPolicyDocumentRuleAllowedParameter {
| **Name** | **Type** | **Description** |
| --- | --- | --- |
-| Key
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}. |
-| Value
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}. |
+| Key
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}. |
+| Value
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}. |
---
@@ -964,7 +964,7 @@ public string Key { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}.
---
@@ -976,7 +976,7 @@ public string[] Value { get; set; }
- *Type:* string[]
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}.
---
@@ -997,8 +997,8 @@ new DataVaultPolicyDocumentRuleDeniedParameter {
| **Name** | **Type** | **Description** |
| --- | --- | --- |
-| Key
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}. |
-| Value
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}. |
+| Key
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}. |
+| Value
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}. |
---
@@ -1010,7 +1010,7 @@ public string Key { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}.
---
@@ -1022,7 +1022,7 @@ public string[] Value { get; set; }
- *Type:* string[]
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}.
---
diff --git a/docs/dataVaultPolicyDocument.go.md b/docs/dataVaultPolicyDocument.go.md
index 6033e055..70f679ef 100644
--- a/docs/dataVaultPolicyDocument.go.md
+++ b/docs/dataVaultPolicyDocument.go.md
@@ -4,7 +4,7 @@
### DataVaultPolicyDocument
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document vault_policy_document}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document vault_policy_document}.
#### Initializers
@@ -399,7 +399,7 @@ The construct id used in the generated config for the DataVaultPolicyDocument to
The id of the existing DataVaultPolicyDocument that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#import import section} in the documentation of this resource for the id to use
---
@@ -681,7 +681,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultpolicydocume
| Lifecycle
| github.com/hashicorp/terraform-cdk-go/cdktf.TerraformResourceLifecycle
| *No description.* |
| Provider
| github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProvider
| *No description.* |
| Provisioners
| *[]interface{}
| *No description.* |
-| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#id DataVaultPolicyDocument#id}. |
+| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#id DataVaultPolicyDocument#id}. |
| Namespace
| *string
| Target namespace. (requires Enterprise). |
| Rule
| interface{}
| rule block. |
@@ -765,7 +765,7 @@ Id *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#id DataVaultPolicyDocument#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#id DataVaultPolicyDocument#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -782,7 +782,7 @@ Namespace *string
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#namespace DataVaultPolicyDocument#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#namespace DataVaultPolicyDocument#namespace}
---
@@ -796,7 +796,7 @@ Rule interface{}
rule block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#rule DataVaultPolicyDocument#rule}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#rule DataVaultPolicyDocument#rule}
---
@@ -823,14 +823,14 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultpolicydocume
| **Name** | **Type** | **Description** |
| --- | --- | --- |
-| Capabilities
| *[]*string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#capabilities DataVaultPolicyDocument#capabilities}. |
-| Path
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#path DataVaultPolicyDocument#path}. |
+| Capabilities
| *[]*string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#capabilities DataVaultPolicyDocument#capabilities}. |
+| Path
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#path DataVaultPolicyDocument#path}. |
| AllowedParameter
| interface{}
| allowed_parameter block. |
| DeniedParameter
| interface{}
| denied_parameter block. |
-| Description
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#description DataVaultPolicyDocument#description}. |
-| MaxWrappingTtl
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#max_wrapping_ttl DataVaultPolicyDocument#max_wrapping_ttl}. |
-| MinWrappingTtl
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#min_wrapping_ttl DataVaultPolicyDocument#min_wrapping_ttl}. |
-| RequiredParameters
| *[]*string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#required_parameters DataVaultPolicyDocument#required_parameters}. |
+| Description
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#description DataVaultPolicyDocument#description}. |
+| MaxWrappingTtl
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#max_wrapping_ttl DataVaultPolicyDocument#max_wrapping_ttl}. |
+| MinWrappingTtl
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#min_wrapping_ttl DataVaultPolicyDocument#min_wrapping_ttl}. |
+| RequiredParameters
| *[]*string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#required_parameters DataVaultPolicyDocument#required_parameters}. |
---
@@ -842,7 +842,7 @@ Capabilities *[]*string
- *Type:* *[]*string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#capabilities DataVaultPolicyDocument#capabilities}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#capabilities DataVaultPolicyDocument#capabilities}.
---
@@ -854,7 +854,7 @@ Path *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#path DataVaultPolicyDocument#path}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#path DataVaultPolicyDocument#path}.
---
@@ -868,7 +868,7 @@ AllowedParameter interface{}
allowed_parameter block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#allowed_parameter DataVaultPolicyDocument#allowed_parameter}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#allowed_parameter DataVaultPolicyDocument#allowed_parameter}
---
@@ -882,7 +882,7 @@ DeniedParameter interface{}
denied_parameter block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#denied_parameter DataVaultPolicyDocument#denied_parameter}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#denied_parameter DataVaultPolicyDocument#denied_parameter}
---
@@ -894,7 +894,7 @@ Description *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#description DataVaultPolicyDocument#description}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#description DataVaultPolicyDocument#description}.
---
@@ -906,7 +906,7 @@ MaxWrappingTtl *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#max_wrapping_ttl DataVaultPolicyDocument#max_wrapping_ttl}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#max_wrapping_ttl DataVaultPolicyDocument#max_wrapping_ttl}.
---
@@ -918,7 +918,7 @@ MinWrappingTtl *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#min_wrapping_ttl DataVaultPolicyDocument#min_wrapping_ttl}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#min_wrapping_ttl DataVaultPolicyDocument#min_wrapping_ttl}.
---
@@ -930,7 +930,7 @@ RequiredParameters *[]*string
- *Type:* *[]*string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#required_parameters DataVaultPolicyDocument#required_parameters}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#required_parameters DataVaultPolicyDocument#required_parameters}.
---
@@ -951,8 +951,8 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultpolicydocume
| **Name** | **Type** | **Description** |
| --- | --- | --- |
-| Key
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}. |
-| Value
| *[]*string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}. |
+| Key
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}. |
+| Value
| *[]*string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}. |
---
@@ -964,7 +964,7 @@ Key *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}.
---
@@ -976,7 +976,7 @@ Value *[]*string
- *Type:* *[]*string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}.
---
@@ -997,8 +997,8 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultpolicydocume
| **Name** | **Type** | **Description** |
| --- | --- | --- |
-| Key
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}. |
-| Value
| *[]*string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}. |
+| Key
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}. |
+| Value
| *[]*string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}. |
---
@@ -1010,7 +1010,7 @@ Key *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}.
---
@@ -1022,7 +1022,7 @@ Value *[]*string
- *Type:* *[]*string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}.
---
diff --git a/docs/dataVaultPolicyDocument.java.md b/docs/dataVaultPolicyDocument.java.md
index d2ca1161..0a369d23 100644
--- a/docs/dataVaultPolicyDocument.java.md
+++ b/docs/dataVaultPolicyDocument.java.md
@@ -4,7 +4,7 @@
### DataVaultPolicyDocument
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document vault_policy_document}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document vault_policy_document}.
#### Initializers
@@ -41,7 +41,7 @@ DataVaultPolicyDocument.Builder.create(Construct scope, java.lang.String id)
| lifecycle
| com.hashicorp.cdktf.TerraformResourceLifecycle
| *No description.* |
| provider
| com.hashicorp.cdktf.TerraformProvider
| *No description.* |
| provisioners
| java.util.List
| *No description.* |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#id DataVaultPolicyDocument#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#id DataVaultPolicyDocument#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
| rule
| com.hashicorp.cdktf.IResolvable OR java.util.List<DataVaultPolicyDocumentRule>
| rule block. |
@@ -111,7 +111,7 @@ Must be unique amongst siblings in the same scope
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#id DataVaultPolicyDocument#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#id DataVaultPolicyDocument#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -124,7 +124,7 @@ If you experience problems setting this value it might not be settable. Please t
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#namespace DataVaultPolicyDocument#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#namespace DataVaultPolicyDocument#namespace}
---
@@ -134,7 +134,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
rule block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#rule DataVaultPolicyDocument#rule}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#rule DataVaultPolicyDocument#rule}
---
@@ -491,7 +491,7 @@ The construct id used in the generated config for the DataVaultPolicyDocument to
The id of the existing DataVaultPolicyDocument that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#import import section} in the documentation of this resource for the id to use
---
@@ -778,7 +778,7 @@ DataVaultPolicyDocumentConfig.builder()
| lifecycle
| com.hashicorp.cdktf.TerraformResourceLifecycle
| *No description.* |
| provider
| com.hashicorp.cdktf.TerraformProvider
| *No description.* |
| provisioners
| java.util.List
| *No description.* |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#id DataVaultPolicyDocument#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#id DataVaultPolicyDocument#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
| rule
| com.hashicorp.cdktf.IResolvable OR java.util.List<DataVaultPolicyDocumentRule>
| rule block. |
@@ -862,7 +862,7 @@ public java.lang.String getId();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#id DataVaultPolicyDocument#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#id DataVaultPolicyDocument#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -879,7 +879,7 @@ public java.lang.String getNamespace();
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#namespace DataVaultPolicyDocument#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#namespace DataVaultPolicyDocument#namespace}
---
@@ -893,7 +893,7 @@ public java.lang.Object getRule();
rule block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#rule DataVaultPolicyDocument#rule}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#rule DataVaultPolicyDocument#rule}
---
@@ -922,14 +922,14 @@ DataVaultPolicyDocumentRule.builder()
| **Name** | **Type** | **Description** |
| --- | --- | --- |
-| capabilities
| java.util.List
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#capabilities DataVaultPolicyDocument#capabilities}. |
-| path
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#path DataVaultPolicyDocument#path}. |
+| capabilities
| java.util.List
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#capabilities DataVaultPolicyDocument#capabilities}. |
+| path
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#path DataVaultPolicyDocument#path}. |
| allowedParameter
| com.hashicorp.cdktf.IResolvable OR java.util.List<DataVaultPolicyDocumentRuleAllowedParameter>
| allowed_parameter block. |
| deniedParameter
| com.hashicorp.cdktf.IResolvable OR java.util.List<DataVaultPolicyDocumentRuleDeniedParameter>
| denied_parameter block. |
-| description
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#description DataVaultPolicyDocument#description}. |
-| maxWrappingTtl
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#max_wrapping_ttl DataVaultPolicyDocument#max_wrapping_ttl}. |
-| minWrappingTtl
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#min_wrapping_ttl DataVaultPolicyDocument#min_wrapping_ttl}. |
-| requiredParameters
| java.util.List
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#required_parameters DataVaultPolicyDocument#required_parameters}. |
+| description
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#description DataVaultPolicyDocument#description}. |
+| maxWrappingTtl
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#max_wrapping_ttl DataVaultPolicyDocument#max_wrapping_ttl}. |
+| minWrappingTtl
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#min_wrapping_ttl DataVaultPolicyDocument#min_wrapping_ttl}. |
+| requiredParameters
| java.util.List
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#required_parameters DataVaultPolicyDocument#required_parameters}. |
---
@@ -941,7 +941,7 @@ public java.util.List getCapabilities();
- *Type:* java.util.List
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#capabilities DataVaultPolicyDocument#capabilities}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#capabilities DataVaultPolicyDocument#capabilities}.
---
@@ -953,7 +953,7 @@ public java.lang.String getPath();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#path DataVaultPolicyDocument#path}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#path DataVaultPolicyDocument#path}.
---
@@ -967,7 +967,7 @@ public java.lang.Object getAllowedParameter();
allowed_parameter block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#allowed_parameter DataVaultPolicyDocument#allowed_parameter}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#allowed_parameter DataVaultPolicyDocument#allowed_parameter}
---
@@ -981,7 +981,7 @@ public java.lang.Object getDeniedParameter();
denied_parameter block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#denied_parameter DataVaultPolicyDocument#denied_parameter}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#denied_parameter DataVaultPolicyDocument#denied_parameter}
---
@@ -993,7 +993,7 @@ public java.lang.String getDescription();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#description DataVaultPolicyDocument#description}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#description DataVaultPolicyDocument#description}.
---
@@ -1005,7 +1005,7 @@ public java.lang.String getMaxWrappingTtl();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#max_wrapping_ttl DataVaultPolicyDocument#max_wrapping_ttl}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#max_wrapping_ttl DataVaultPolicyDocument#max_wrapping_ttl}.
---
@@ -1017,7 +1017,7 @@ public java.lang.String getMinWrappingTtl();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#min_wrapping_ttl DataVaultPolicyDocument#min_wrapping_ttl}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#min_wrapping_ttl DataVaultPolicyDocument#min_wrapping_ttl}.
---
@@ -1029,7 +1029,7 @@ public java.util.List getRequiredParameters();
- *Type:* java.util.List
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#required_parameters DataVaultPolicyDocument#required_parameters}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#required_parameters DataVaultPolicyDocument#required_parameters}.
---
@@ -1050,8 +1050,8 @@ DataVaultPolicyDocumentRuleAllowedParameter.builder()
| **Name** | **Type** | **Description** |
| --- | --- | --- |
-| key
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}. |
-| value
| java.util.List
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}. |
+| key
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}. |
+| value
| java.util.List
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}. |
---
@@ -1063,7 +1063,7 @@ public java.lang.String getKey();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}.
---
@@ -1075,7 +1075,7 @@ public java.util.List getValue();
- *Type:* java.util.List
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}.
---
@@ -1096,8 +1096,8 @@ DataVaultPolicyDocumentRuleDeniedParameter.builder()
| **Name** | **Type** | **Description** |
| --- | --- | --- |
-| key
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}. |
-| value
| java.util.List
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}. |
+| key
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}. |
+| value
| java.util.List
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}. |
---
@@ -1109,7 +1109,7 @@ public java.lang.String getKey();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}.
---
@@ -1121,7 +1121,7 @@ public java.util.List getValue();
- *Type:* java.util.List
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}.
---
diff --git a/docs/dataVaultPolicyDocument.python.md b/docs/dataVaultPolicyDocument.python.md
index 81ace2a6..4ba40271 100644
--- a/docs/dataVaultPolicyDocument.python.md
+++ b/docs/dataVaultPolicyDocument.python.md
@@ -4,7 +4,7 @@
### DataVaultPolicyDocument
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document vault_policy_document}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document vault_policy_document}.
#### Initializers
@@ -38,7 +38,7 @@ dataVaultPolicyDocument.DataVaultPolicyDocument(
| lifecycle
| cdktf.TerraformResourceLifecycle
| *No description.* |
| provider
| cdktf.TerraformProvider
| *No description.* |
| provisioners
| typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]]
| *No description.* |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#id DataVaultPolicyDocument#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#id DataVaultPolicyDocument#id}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
| rule
| typing.Union[cdktf.IResolvable, typing.List[DataVaultPolicyDocumentRule]]
| rule block. |
@@ -108,7 +108,7 @@ Must be unique amongst siblings in the same scope
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#id DataVaultPolicyDocument#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#id DataVaultPolicyDocument#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -121,7 +121,7 @@ If you experience problems setting this value it might not be settable. Please t
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#namespace DataVaultPolicyDocument#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#namespace DataVaultPolicyDocument#namespace}
---
@@ -131,7 +131,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
rule block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#rule DataVaultPolicyDocument#rule}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#rule DataVaultPolicyDocument#rule}
---
@@ -526,7 +526,7 @@ The construct id used in the generated config for the DataVaultPolicyDocument to
The id of the existing DataVaultPolicyDocument that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#import import section} in the documentation of this resource for the id to use
---
@@ -808,7 +808,7 @@ dataVaultPolicyDocument.DataVaultPolicyDocumentConfig(
| lifecycle
| cdktf.TerraformResourceLifecycle
| *No description.* |
| provider
| cdktf.TerraformProvider
| *No description.* |
| provisioners
| typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]]
| *No description.* |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#id DataVaultPolicyDocument#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#id DataVaultPolicyDocument#id}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
| rule
| typing.Union[cdktf.IResolvable, typing.List[DataVaultPolicyDocumentRule]]
| rule block. |
@@ -892,7 +892,7 @@ id: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#id DataVaultPolicyDocument#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#id DataVaultPolicyDocument#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -909,7 +909,7 @@ namespace: str
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#namespace DataVaultPolicyDocument#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#namespace DataVaultPolicyDocument#namespace}
---
@@ -923,7 +923,7 @@ rule: typing.Union[IResolvable, typing.List[DataVaultPolicyDocumentRule]]
rule block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#rule DataVaultPolicyDocument#rule}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#rule DataVaultPolicyDocument#rule}
---
@@ -950,14 +950,14 @@ dataVaultPolicyDocument.DataVaultPolicyDocumentRule(
| **Name** | **Type** | **Description** |
| --- | --- | --- |
-| capabilities
| typing.List[str]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#capabilities DataVaultPolicyDocument#capabilities}. |
-| path
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#path DataVaultPolicyDocument#path}. |
+| capabilities
| typing.List[str]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#capabilities DataVaultPolicyDocument#capabilities}. |
+| path
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#path DataVaultPolicyDocument#path}. |
| allowed_parameter
| typing.Union[cdktf.IResolvable, typing.List[DataVaultPolicyDocumentRuleAllowedParameter]]
| allowed_parameter block. |
| denied_parameter
| typing.Union[cdktf.IResolvable, typing.List[DataVaultPolicyDocumentRuleDeniedParameter]]
| denied_parameter block. |
-| description
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#description DataVaultPolicyDocument#description}. |
-| max_wrapping_ttl
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#max_wrapping_ttl DataVaultPolicyDocument#max_wrapping_ttl}. |
-| min_wrapping_ttl
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#min_wrapping_ttl DataVaultPolicyDocument#min_wrapping_ttl}. |
-| required_parameters
| typing.List[str]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#required_parameters DataVaultPolicyDocument#required_parameters}. |
+| description
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#description DataVaultPolicyDocument#description}. |
+| max_wrapping_ttl
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#max_wrapping_ttl DataVaultPolicyDocument#max_wrapping_ttl}. |
+| min_wrapping_ttl
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#min_wrapping_ttl DataVaultPolicyDocument#min_wrapping_ttl}. |
+| required_parameters
| typing.List[str]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#required_parameters DataVaultPolicyDocument#required_parameters}. |
---
@@ -969,7 +969,7 @@ capabilities: typing.List[str]
- *Type:* typing.List[str]
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#capabilities DataVaultPolicyDocument#capabilities}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#capabilities DataVaultPolicyDocument#capabilities}.
---
@@ -981,7 +981,7 @@ path: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#path DataVaultPolicyDocument#path}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#path DataVaultPolicyDocument#path}.
---
@@ -995,7 +995,7 @@ allowed_parameter: typing.Union[IResolvable, typing.List[DataVaultPolicyDocument
allowed_parameter block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#allowed_parameter DataVaultPolicyDocument#allowed_parameter}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#allowed_parameter DataVaultPolicyDocument#allowed_parameter}
---
@@ -1009,7 +1009,7 @@ denied_parameter: typing.Union[IResolvable, typing.List[DataVaultPolicyDocumentR
denied_parameter block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#denied_parameter DataVaultPolicyDocument#denied_parameter}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#denied_parameter DataVaultPolicyDocument#denied_parameter}
---
@@ -1021,7 +1021,7 @@ description: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#description DataVaultPolicyDocument#description}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#description DataVaultPolicyDocument#description}.
---
@@ -1033,7 +1033,7 @@ max_wrapping_ttl: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#max_wrapping_ttl DataVaultPolicyDocument#max_wrapping_ttl}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#max_wrapping_ttl DataVaultPolicyDocument#max_wrapping_ttl}.
---
@@ -1045,7 +1045,7 @@ min_wrapping_ttl: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#min_wrapping_ttl DataVaultPolicyDocument#min_wrapping_ttl}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#min_wrapping_ttl DataVaultPolicyDocument#min_wrapping_ttl}.
---
@@ -1057,7 +1057,7 @@ required_parameters: typing.List[str]
- *Type:* typing.List[str]
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#required_parameters DataVaultPolicyDocument#required_parameters}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#required_parameters DataVaultPolicyDocument#required_parameters}.
---
@@ -1078,8 +1078,8 @@ dataVaultPolicyDocument.DataVaultPolicyDocumentRuleAllowedParameter(
| **Name** | **Type** | **Description** |
| --- | --- | --- |
-| key
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}. |
-| value
| typing.List[str]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}. |
+| key
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}. |
+| value
| typing.List[str]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}. |
---
@@ -1091,7 +1091,7 @@ key: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}.
---
@@ -1103,7 +1103,7 @@ value: typing.List[str]
- *Type:* typing.List[str]
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}.
---
@@ -1124,8 +1124,8 @@ dataVaultPolicyDocument.DataVaultPolicyDocumentRuleDeniedParameter(
| **Name** | **Type** | **Description** |
| --- | --- | --- |
-| key
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}. |
-| value
| typing.List[str]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}. |
+| key
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}. |
+| value
| typing.List[str]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}. |
---
@@ -1137,7 +1137,7 @@ key: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}.
---
@@ -1149,7 +1149,7 @@ value: typing.List[str]
- *Type:* typing.List[str]
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}.
---
diff --git a/docs/dataVaultPolicyDocument.typescript.md b/docs/dataVaultPolicyDocument.typescript.md
index 1d2b14dc..55170e2b 100644
--- a/docs/dataVaultPolicyDocument.typescript.md
+++ b/docs/dataVaultPolicyDocument.typescript.md
@@ -4,7 +4,7 @@
### DataVaultPolicyDocument
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document vault_policy_document}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document vault_policy_document}.
#### Initializers
@@ -399,7 +399,7 @@ The construct id used in the generated config for the DataVaultPolicyDocument to
The id of the existing DataVaultPolicyDocument that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#import import section} in the documentation of this resource for the id to use
---
@@ -670,7 +670,7 @@ const dataVaultPolicyDocumentConfig: dataVaultPolicyDocument.DataVaultPolicyDocu
| lifecycle
| cdktf.TerraformResourceLifecycle
| *No description.* |
| provider
| cdktf.TerraformProvider
| *No description.* |
| provisioners
| cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[]
| *No description.* |
-| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#id DataVaultPolicyDocument#id}. |
+| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#id DataVaultPolicyDocument#id}. |
| namespace
| string
| Target namespace. (requires Enterprise). |
| rule
| cdktf.IResolvable \| DataVaultPolicyDocumentRule[]
| rule block. |
@@ -754,7 +754,7 @@ public readonly id: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#id DataVaultPolicyDocument#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#id DataVaultPolicyDocument#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -771,7 +771,7 @@ public readonly namespace: string;
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#namespace DataVaultPolicyDocument#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#namespace DataVaultPolicyDocument#namespace}
---
@@ -785,7 +785,7 @@ public readonly rule: IResolvable | DataVaultPolicyDocumentRule[];
rule block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#rule DataVaultPolicyDocument#rule}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#rule DataVaultPolicyDocument#rule}
---
@@ -803,14 +803,14 @@ const dataVaultPolicyDocumentRule: dataVaultPolicyDocument.DataVaultPolicyDocume
| **Name** | **Type** | **Description** |
| --- | --- | --- |
-| capabilities
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#capabilities DataVaultPolicyDocument#capabilities}. |
-| path
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#path DataVaultPolicyDocument#path}. |
+| capabilities
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#capabilities DataVaultPolicyDocument#capabilities}. |
+| path
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#path DataVaultPolicyDocument#path}. |
| allowedParameter
| cdktf.IResolvable \| DataVaultPolicyDocumentRuleAllowedParameter[]
| allowed_parameter block. |
| deniedParameter
| cdktf.IResolvable \| DataVaultPolicyDocumentRuleDeniedParameter[]
| denied_parameter block. |
-| description
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#description DataVaultPolicyDocument#description}. |
-| maxWrappingTtl
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#max_wrapping_ttl DataVaultPolicyDocument#max_wrapping_ttl}. |
-| minWrappingTtl
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#min_wrapping_ttl DataVaultPolicyDocument#min_wrapping_ttl}. |
-| requiredParameters
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#required_parameters DataVaultPolicyDocument#required_parameters}. |
+| description
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#description DataVaultPolicyDocument#description}. |
+| maxWrappingTtl
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#max_wrapping_ttl DataVaultPolicyDocument#max_wrapping_ttl}. |
+| minWrappingTtl
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#min_wrapping_ttl DataVaultPolicyDocument#min_wrapping_ttl}. |
+| requiredParameters
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#required_parameters DataVaultPolicyDocument#required_parameters}. |
---
@@ -822,7 +822,7 @@ public readonly capabilities: string[];
- *Type:* string[]
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#capabilities DataVaultPolicyDocument#capabilities}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#capabilities DataVaultPolicyDocument#capabilities}.
---
@@ -834,7 +834,7 @@ public readonly path: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#path DataVaultPolicyDocument#path}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#path DataVaultPolicyDocument#path}.
---
@@ -848,7 +848,7 @@ public readonly allowedParameter: IResolvable | DataVaultPolicyDocumentRuleAllow
allowed_parameter block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#allowed_parameter DataVaultPolicyDocument#allowed_parameter}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#allowed_parameter DataVaultPolicyDocument#allowed_parameter}
---
@@ -862,7 +862,7 @@ public readonly deniedParameter: IResolvable | DataVaultPolicyDocumentRuleDenied
denied_parameter block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#denied_parameter DataVaultPolicyDocument#denied_parameter}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#denied_parameter DataVaultPolicyDocument#denied_parameter}
---
@@ -874,7 +874,7 @@ public readonly description: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#description DataVaultPolicyDocument#description}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#description DataVaultPolicyDocument#description}.
---
@@ -886,7 +886,7 @@ public readonly maxWrappingTtl: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#max_wrapping_ttl DataVaultPolicyDocument#max_wrapping_ttl}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#max_wrapping_ttl DataVaultPolicyDocument#max_wrapping_ttl}.
---
@@ -898,7 +898,7 @@ public readonly minWrappingTtl: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#min_wrapping_ttl DataVaultPolicyDocument#min_wrapping_ttl}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#min_wrapping_ttl DataVaultPolicyDocument#min_wrapping_ttl}.
---
@@ -910,7 +910,7 @@ public readonly requiredParameters: string[];
- *Type:* string[]
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#required_parameters DataVaultPolicyDocument#required_parameters}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#required_parameters DataVaultPolicyDocument#required_parameters}.
---
@@ -928,8 +928,8 @@ const dataVaultPolicyDocumentRuleAllowedParameter: dataVaultPolicyDocument.DataV
| **Name** | **Type** | **Description** |
| --- | --- | --- |
-| key
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}. |
-| value
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}. |
+| key
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}. |
+| value
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}. |
---
@@ -941,7 +941,7 @@ public readonly key: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}.
---
@@ -953,7 +953,7 @@ public readonly value: string[];
- *Type:* string[]
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}.
---
@@ -971,8 +971,8 @@ const dataVaultPolicyDocumentRuleDeniedParameter: dataVaultPolicyDocument.DataVa
| **Name** | **Type** | **Description** |
| --- | --- | --- |
-| key
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}. |
-| value
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}. |
+| key
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}. |
+| value
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}. |
---
@@ -984,7 +984,7 @@ public readonly key: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}.
---
@@ -996,7 +996,7 @@ public readonly value: string[];
- *Type:* string[]
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}.
---
diff --git a/docs/dataVaultRaftAutopilotState.csharp.md b/docs/dataVaultRaftAutopilotState.csharp.md
index 39e0cec0..a0c39b3f 100644
--- a/docs/dataVaultRaftAutopilotState.csharp.md
+++ b/docs/dataVaultRaftAutopilotState.csharp.md
@@ -4,7 +4,7 @@
### DataVaultRaftAutopilotState
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/raft_autopilot_state vault_raft_autopilot_state}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/raft_autopilot_state vault_raft_autopilot_state}.
#### Initializers
@@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultRaftAutopilotStat
The id of the existing DataVaultRaftAutopilotState that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/raft_autopilot_state#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/raft_autopilot_state#import import section} in the documentation of this resource for the id to use
---
@@ -748,7 +748,7 @@ new DataVaultRaftAutopilotStateConfig {
| Lifecycle
| HashiCorp.Cdktf.TerraformResourceLifecycle
| *No description.* |
| Provider
| HashiCorp.Cdktf.TerraformProvider
| *No description.* |
| Provisioners
| object[]
| *No description.* |
-| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/raft_autopilot_state#id DataVaultRaftAutopilotState#id}. |
+| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/raft_autopilot_state#id DataVaultRaftAutopilotState#id}. |
| Namespace
| string
| Target namespace. (requires Enterprise). |
---
@@ -831,7 +831,7 @@ public string Id { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/raft_autopilot_state#id DataVaultRaftAutopilotState#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/raft_autopilot_state#id DataVaultRaftAutopilotState#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -848,7 +848,7 @@ public string Namespace { get; set; }
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/raft_autopilot_state#namespace DataVaultRaftAutopilotState#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/raft_autopilot_state#namespace DataVaultRaftAutopilotState#namespace}
---
diff --git a/docs/dataVaultRaftAutopilotState.go.md b/docs/dataVaultRaftAutopilotState.go.md
index 37f5d56f..998bf9f0 100644
--- a/docs/dataVaultRaftAutopilotState.go.md
+++ b/docs/dataVaultRaftAutopilotState.go.md
@@ -4,7 +4,7 @@
### DataVaultRaftAutopilotState
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/raft_autopilot_state vault_raft_autopilot_state}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/raft_autopilot_state vault_raft_autopilot_state}.
#### Initializers
@@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultRaftAutopilotStat
The id of the existing DataVaultRaftAutopilotState that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/raft_autopilot_state#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/raft_autopilot_state#import import section} in the documentation of this resource for the id to use
---
@@ -748,7 +748,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultraftautopilo
| Lifecycle
| github.com/hashicorp/terraform-cdk-go/cdktf.TerraformResourceLifecycle
| *No description.* |
| Provider
| github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProvider
| *No description.* |
| Provisioners
| *[]interface{}
| *No description.* |
-| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/raft_autopilot_state#id DataVaultRaftAutopilotState#id}. |
+| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/raft_autopilot_state#id DataVaultRaftAutopilotState#id}. |
| Namespace
| *string
| Target namespace. (requires Enterprise). |
---
@@ -831,7 +831,7 @@ Id *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/raft_autopilot_state#id DataVaultRaftAutopilotState#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/raft_autopilot_state#id DataVaultRaftAutopilotState#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -848,7 +848,7 @@ Namespace *string
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/raft_autopilot_state#namespace DataVaultRaftAutopilotState#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/raft_autopilot_state#namespace DataVaultRaftAutopilotState#namespace}
---
diff --git a/docs/dataVaultRaftAutopilotState.java.md b/docs/dataVaultRaftAutopilotState.java.md
index 53513a41..4870d8e2 100644
--- a/docs/dataVaultRaftAutopilotState.java.md
+++ b/docs/dataVaultRaftAutopilotState.java.md
@@ -4,7 +4,7 @@
### DataVaultRaftAutopilotState
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/raft_autopilot_state vault_raft_autopilot_state}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/raft_autopilot_state vault_raft_autopilot_state}.
#### Initializers
@@ -39,7 +39,7 @@ DataVaultRaftAutopilotState.Builder.create(Construct scope, java.lang.String id)
| lifecycle
| com.hashicorp.cdktf.TerraformResourceLifecycle
| *No description.* |
| provider
| com.hashicorp.cdktf.TerraformProvider
| *No description.* |
| provisioners
| java.util.List
| *No description.* |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/raft_autopilot_state#id DataVaultRaftAutopilotState#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/raft_autopilot_state#id DataVaultRaftAutopilotState#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
---
@@ -108,7 +108,7 @@ Must be unique amongst siblings in the same scope
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/raft_autopilot_state#id DataVaultRaftAutopilotState#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/raft_autopilot_state#id DataVaultRaftAutopilotState#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -121,7 +121,7 @@ If you experience problems setting this value it might not be settable. Please t
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/raft_autopilot_state#namespace DataVaultRaftAutopilotState#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/raft_autopilot_state#namespace DataVaultRaftAutopilotState#namespace}
---
@@ -458,7 +458,7 @@ The construct id used in the generated config for the DataVaultRaftAutopilotStat
The id of the existing DataVaultRaftAutopilotState that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/raft_autopilot_state#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/raft_autopilot_state#import import section} in the documentation of this resource for the id to use
---
@@ -831,7 +831,7 @@ DataVaultRaftAutopilotStateConfig.builder()
| lifecycle
| com.hashicorp.cdktf.TerraformResourceLifecycle
| *No description.* |
| provider
| com.hashicorp.cdktf.TerraformProvider
| *No description.* |
| provisioners
| java.util.List
| *No description.* |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/raft_autopilot_state#id DataVaultRaftAutopilotState#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/raft_autopilot_state#id DataVaultRaftAutopilotState#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
---
@@ -914,7 +914,7 @@ public java.lang.String getId();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/raft_autopilot_state#id DataVaultRaftAutopilotState#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/raft_autopilot_state#id DataVaultRaftAutopilotState#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -931,7 +931,7 @@ public java.lang.String getNamespace();
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/raft_autopilot_state#namespace DataVaultRaftAutopilotState#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/raft_autopilot_state#namespace DataVaultRaftAutopilotState#namespace}
---
diff --git a/docs/dataVaultRaftAutopilotState.python.md b/docs/dataVaultRaftAutopilotState.python.md
index 8fce7b73..30f9f775 100644
--- a/docs/dataVaultRaftAutopilotState.python.md
+++ b/docs/dataVaultRaftAutopilotState.python.md
@@ -4,7 +4,7 @@
### DataVaultRaftAutopilotState
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/raft_autopilot_state vault_raft_autopilot_state}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/raft_autopilot_state vault_raft_autopilot_state}.
#### Initializers
@@ -37,7 +37,7 @@ dataVaultRaftAutopilotState.DataVaultRaftAutopilotState(
| lifecycle
| cdktf.TerraformResourceLifecycle
| *No description.* |
| provider
| cdktf.TerraformProvider
| *No description.* |
| provisioners
| typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]]
| *No description.* |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/raft_autopilot_state#id DataVaultRaftAutopilotState#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/raft_autopilot_state#id DataVaultRaftAutopilotState#id}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
---
@@ -106,7 +106,7 @@ Must be unique amongst siblings in the same scope
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/raft_autopilot_state#id DataVaultRaftAutopilotState#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/raft_autopilot_state#id DataVaultRaftAutopilotState#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -119,7 +119,7 @@ If you experience problems setting this value it might not be settable. Please t
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/raft_autopilot_state#namespace DataVaultRaftAutopilotState#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/raft_autopilot_state#namespace DataVaultRaftAutopilotState#namespace}
---
@@ -492,7 +492,7 @@ The construct id used in the generated config for the DataVaultRaftAutopilotStat
The id of the existing DataVaultRaftAutopilotState that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/raft_autopilot_state#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/raft_autopilot_state#import import section} in the documentation of this resource for the id to use
---
@@ -861,7 +861,7 @@ dataVaultRaftAutopilotState.DataVaultRaftAutopilotStateConfig(
| lifecycle
| cdktf.TerraformResourceLifecycle
| *No description.* |
| provider
| cdktf.TerraformProvider
| *No description.* |
| provisioners
| typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]]
| *No description.* |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/raft_autopilot_state#id DataVaultRaftAutopilotState#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/raft_autopilot_state#id DataVaultRaftAutopilotState#id}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
---
@@ -944,7 +944,7 @@ id: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/raft_autopilot_state#id DataVaultRaftAutopilotState#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/raft_autopilot_state#id DataVaultRaftAutopilotState#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -961,7 +961,7 @@ namespace: str
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/raft_autopilot_state#namespace DataVaultRaftAutopilotState#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/raft_autopilot_state#namespace DataVaultRaftAutopilotState#namespace}
---
diff --git a/docs/dataVaultRaftAutopilotState.typescript.md b/docs/dataVaultRaftAutopilotState.typescript.md
index af946d1e..f4d81de3 100644
--- a/docs/dataVaultRaftAutopilotState.typescript.md
+++ b/docs/dataVaultRaftAutopilotState.typescript.md
@@ -4,7 +4,7 @@
### DataVaultRaftAutopilotState
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/raft_autopilot_state vault_raft_autopilot_state}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/raft_autopilot_state vault_raft_autopilot_state}.
#### Initializers
@@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultRaftAutopilotStat
The id of the existing DataVaultRaftAutopilotState that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/raft_autopilot_state#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/raft_autopilot_state#import import section} in the documentation of this resource for the id to use
---
@@ -738,7 +738,7 @@ const dataVaultRaftAutopilotStateConfig: dataVaultRaftAutopilotState.DataVaultRa
| lifecycle
| cdktf.TerraformResourceLifecycle
| *No description.* |
| provider
| cdktf.TerraformProvider
| *No description.* |
| provisioners
| cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[]
| *No description.* |
-| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/raft_autopilot_state#id DataVaultRaftAutopilotState#id}. |
+| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/raft_autopilot_state#id DataVaultRaftAutopilotState#id}. |
| namespace
| string
| Target namespace. (requires Enterprise). |
---
@@ -821,7 +821,7 @@ public readonly id: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/raft_autopilot_state#id DataVaultRaftAutopilotState#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/raft_autopilot_state#id DataVaultRaftAutopilotState#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -838,7 +838,7 @@ public readonly namespace: string;
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/raft_autopilot_state#namespace DataVaultRaftAutopilotState#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/raft_autopilot_state#namespace DataVaultRaftAutopilotState#namespace}
---
diff --git a/docs/dataVaultTransformDecode.csharp.md b/docs/dataVaultTransformDecode.csharp.md
index f8ebe9e3..17dded81 100644
--- a/docs/dataVaultTransformDecode.csharp.md
+++ b/docs/dataVaultTransformDecode.csharp.md
@@ -4,7 +4,7 @@
### DataVaultTransformDecode
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode vault_transform_decode}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode vault_transform_decode}.
#### Initializers
@@ -421,7 +421,7 @@ The construct id used in the generated config for the DataVaultTransformDecode t
The id of the existing DataVaultTransformDecode that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#import import section} in the documentation of this resource for the id to use
---
@@ -858,7 +858,7 @@ new DataVaultTransformDecodeConfig {
| BatchInput
| object
| Specifies a list of items to be decoded in a single batch. |
| BatchResults
| object
| The result of decoding batch_input. |
| DecodedValue
| string
| The result of decoding a value. |
-| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#id DataVaultTransformDecode#id}. |
+| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#id DataVaultTransformDecode#id}. |
| Namespace
| string
| Target namespace. (requires Enterprise). |
| Transformation
| string
| The transformation to perform. |
| Tweak
| string
| The tweak value to use. Only applicable for FPE transformations. |
@@ -946,7 +946,7 @@ public string Path { get; set; }
Path to backend from which to retrieve data.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#path DataVaultTransformDecode#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#path DataVaultTransformDecode#path}
---
@@ -960,7 +960,7 @@ public string RoleName { get; set; }
The name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#role_name DataVaultTransformDecode#role_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#role_name DataVaultTransformDecode#role_name}
---
@@ -976,7 +976,7 @@ Specifies a list of items to be decoded in a single batch.
If this parameter is set, the top-level parameters 'value', 'transformation' and 'tweak' will be ignored. Each batch item within the list can specify these parameters instead.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#batch_input DataVaultTransformDecode#batch_input}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#batch_input DataVaultTransformDecode#batch_input}
---
@@ -990,7 +990,7 @@ public object BatchResults { get; set; }
The result of decoding batch_input.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#batch_results DataVaultTransformDecode#batch_results}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#batch_results DataVaultTransformDecode#batch_results}
---
@@ -1004,7 +1004,7 @@ public string DecodedValue { get; set; }
The result of decoding a value.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#decoded_value DataVaultTransformDecode#decoded_value}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#decoded_value DataVaultTransformDecode#decoded_value}
---
@@ -1016,7 +1016,7 @@ public string Id { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#id DataVaultTransformDecode#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#id DataVaultTransformDecode#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1033,7 +1033,7 @@ public string Namespace { get; set; }
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#namespace DataVaultTransformDecode#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#namespace DataVaultTransformDecode#namespace}
---
@@ -1049,7 +1049,7 @@ The transformation to perform.
If no value is provided and the role contains a single transformation, this value will be inferred from the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#transformation DataVaultTransformDecode#transformation}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#transformation DataVaultTransformDecode#transformation}
---
@@ -1063,7 +1063,7 @@ public string Tweak { get; set; }
The tweak value to use. Only applicable for FPE transformations.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#tweak DataVaultTransformDecode#tweak}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#tweak DataVaultTransformDecode#tweak}
---
@@ -1077,7 +1077,7 @@ public string Value { get; set; }
The value in which to decode.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#value DataVaultTransformDecode#value}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#value DataVaultTransformDecode#value}
---
diff --git a/docs/dataVaultTransformDecode.go.md b/docs/dataVaultTransformDecode.go.md
index a90ae071..22a75a30 100644
--- a/docs/dataVaultTransformDecode.go.md
+++ b/docs/dataVaultTransformDecode.go.md
@@ -4,7 +4,7 @@
### DataVaultTransformDecode
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode vault_transform_decode}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode vault_transform_decode}.
#### Initializers
@@ -421,7 +421,7 @@ The construct id used in the generated config for the DataVaultTransformDecode t
The id of the existing DataVaultTransformDecode that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#import import section} in the documentation of this resource for the id to use
---
@@ -858,7 +858,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaulttransformdec
| BatchInput
| interface{}
| Specifies a list of items to be decoded in a single batch. |
| BatchResults
| interface{}
| The result of decoding batch_input. |
| DecodedValue
| *string
| The result of decoding a value. |
-| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#id DataVaultTransformDecode#id}. |
+| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#id DataVaultTransformDecode#id}. |
| Namespace
| *string
| Target namespace. (requires Enterprise). |
| Transformation
| *string
| The transformation to perform. |
| Tweak
| *string
| The tweak value to use. Only applicable for FPE transformations. |
@@ -946,7 +946,7 @@ Path *string
Path to backend from which to retrieve data.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#path DataVaultTransformDecode#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#path DataVaultTransformDecode#path}
---
@@ -960,7 +960,7 @@ RoleName *string
The name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#role_name DataVaultTransformDecode#role_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#role_name DataVaultTransformDecode#role_name}
---
@@ -976,7 +976,7 @@ Specifies a list of items to be decoded in a single batch.
If this parameter is set, the top-level parameters 'value', 'transformation' and 'tweak' will be ignored. Each batch item within the list can specify these parameters instead.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#batch_input DataVaultTransformDecode#batch_input}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#batch_input DataVaultTransformDecode#batch_input}
---
@@ -990,7 +990,7 @@ BatchResults interface{}
The result of decoding batch_input.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#batch_results DataVaultTransformDecode#batch_results}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#batch_results DataVaultTransformDecode#batch_results}
---
@@ -1004,7 +1004,7 @@ DecodedValue *string
The result of decoding a value.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#decoded_value DataVaultTransformDecode#decoded_value}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#decoded_value DataVaultTransformDecode#decoded_value}
---
@@ -1016,7 +1016,7 @@ Id *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#id DataVaultTransformDecode#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#id DataVaultTransformDecode#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1033,7 +1033,7 @@ Namespace *string
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#namespace DataVaultTransformDecode#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#namespace DataVaultTransformDecode#namespace}
---
@@ -1049,7 +1049,7 @@ The transformation to perform.
If no value is provided and the role contains a single transformation, this value will be inferred from the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#transformation DataVaultTransformDecode#transformation}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#transformation DataVaultTransformDecode#transformation}
---
@@ -1063,7 +1063,7 @@ Tweak *string
The tweak value to use. Only applicable for FPE transformations.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#tweak DataVaultTransformDecode#tweak}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#tweak DataVaultTransformDecode#tweak}
---
@@ -1077,7 +1077,7 @@ Value *string
The value in which to decode.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#value DataVaultTransformDecode#value}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#value DataVaultTransformDecode#value}
---
diff --git a/docs/dataVaultTransformDecode.java.md b/docs/dataVaultTransformDecode.java.md
index fc1205b0..befbc46e 100644
--- a/docs/dataVaultTransformDecode.java.md
+++ b/docs/dataVaultTransformDecode.java.md
@@ -4,7 +4,7 @@
### DataVaultTransformDecode
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode vault_transform_decode}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode vault_transform_decode}.
#### Initializers
@@ -54,7 +54,7 @@ DataVaultTransformDecode.Builder.create(Construct scope, java.lang.String id)
| batchInput
| com.hashicorp.cdktf.IResolvable OR java.util.List>
| Specifies a list of items to be decoded in a single batch. |
| batchResults
| com.hashicorp.cdktf.IResolvable OR java.util.List>
| The result of decoding batch_input. |
| decodedValue
| java.lang.String
| The result of decoding a value. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#id DataVaultTransformDecode#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#id DataVaultTransformDecode#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
| transformation
| java.lang.String
| The transformation to perform. |
| tweak
| java.lang.String
| The tweak value to use. Only applicable for FPE transformations. |
@@ -128,7 +128,7 @@ Must be unique amongst siblings in the same scope
Path to backend from which to retrieve data.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#path DataVaultTransformDecode#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#path DataVaultTransformDecode#path}
---
@@ -138,7 +138,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#role_name DataVaultTransformDecode#role_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#role_name DataVaultTransformDecode#role_name}
---
@@ -150,7 +150,7 @@ Specifies a list of items to be decoded in a single batch.
If this parameter is set, the top-level parameters 'value', 'transformation' and 'tweak' will be ignored. Each batch item within the list can specify these parameters instead.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#batch_input DataVaultTransformDecode#batch_input}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#batch_input DataVaultTransformDecode#batch_input}
---
@@ -160,7 +160,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The result of decoding batch_input.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#batch_results DataVaultTransformDecode#batch_results}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#batch_results DataVaultTransformDecode#batch_results}
---
@@ -170,7 +170,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The result of decoding a value.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#decoded_value DataVaultTransformDecode#decoded_value}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#decoded_value DataVaultTransformDecode#decoded_value}
---
@@ -178,7 +178,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#id DataVaultTransformDecode#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#id DataVaultTransformDecode#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -191,7 +191,7 @@ If you experience problems setting this value it might not be settable. Please t
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#namespace DataVaultTransformDecode#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#namespace DataVaultTransformDecode#namespace}
---
@@ -203,7 +203,7 @@ The transformation to perform.
If no value is provided and the role contains a single transformation, this value will be inferred from the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#transformation DataVaultTransformDecode#transformation}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#transformation DataVaultTransformDecode#transformation}
---
@@ -213,7 +213,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The tweak value to use. Only applicable for FPE transformations.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#tweak DataVaultTransformDecode#tweak}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#tweak DataVaultTransformDecode#tweak}
---
@@ -223,7 +223,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The value in which to decode.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#value DataVaultTransformDecode#value}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#value DataVaultTransformDecode#value}
---
@@ -602,7 +602,7 @@ The construct id used in the generated config for the DataVaultTransformDecode t
The id of the existing DataVaultTransformDecode that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#import import section} in the documentation of this resource for the id to use
---
@@ -1045,7 +1045,7 @@ DataVaultTransformDecodeConfig.builder()
| batchInput
| com.hashicorp.cdktf.IResolvable OR java.util.List>
| Specifies a list of items to be decoded in a single batch. |
| batchResults
| com.hashicorp.cdktf.IResolvable OR java.util.List>
| The result of decoding batch_input. |
| decodedValue
| java.lang.String
| The result of decoding a value. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#id DataVaultTransformDecode#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#id DataVaultTransformDecode#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
| transformation
| java.lang.String
| The transformation to perform. |
| tweak
| java.lang.String
| The tweak value to use. Only applicable for FPE transformations. |
@@ -1133,7 +1133,7 @@ public java.lang.String getPath();
Path to backend from which to retrieve data.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#path DataVaultTransformDecode#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#path DataVaultTransformDecode#path}
---
@@ -1147,7 +1147,7 @@ public java.lang.String getRoleName();
The name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#role_name DataVaultTransformDecode#role_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#role_name DataVaultTransformDecode#role_name}
---
@@ -1163,7 +1163,7 @@ Specifies a list of items to be decoded in a single batch.
If this parameter is set, the top-level parameters 'value', 'transformation' and 'tweak' will be ignored. Each batch item within the list can specify these parameters instead.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#batch_input DataVaultTransformDecode#batch_input}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#batch_input DataVaultTransformDecode#batch_input}
---
@@ -1177,7 +1177,7 @@ public java.lang.Object getBatchResults();
The result of decoding batch_input.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#batch_results DataVaultTransformDecode#batch_results}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#batch_results DataVaultTransformDecode#batch_results}
---
@@ -1191,7 +1191,7 @@ public java.lang.String getDecodedValue();
The result of decoding a value.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#decoded_value DataVaultTransformDecode#decoded_value}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#decoded_value DataVaultTransformDecode#decoded_value}
---
@@ -1203,7 +1203,7 @@ public java.lang.String getId();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#id DataVaultTransformDecode#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#id DataVaultTransformDecode#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1220,7 +1220,7 @@ public java.lang.String getNamespace();
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#namespace DataVaultTransformDecode#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#namespace DataVaultTransformDecode#namespace}
---
@@ -1236,7 +1236,7 @@ The transformation to perform.
If no value is provided and the role contains a single transformation, this value will be inferred from the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#transformation DataVaultTransformDecode#transformation}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#transformation DataVaultTransformDecode#transformation}
---
@@ -1250,7 +1250,7 @@ public java.lang.String getTweak();
The tweak value to use. Only applicable for FPE transformations.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#tweak DataVaultTransformDecode#tweak}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#tweak DataVaultTransformDecode#tweak}
---
@@ -1264,7 +1264,7 @@ public java.lang.String getValue();
The value in which to decode.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#value DataVaultTransformDecode#value}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#value DataVaultTransformDecode#value}
---
diff --git a/docs/dataVaultTransformDecode.python.md b/docs/dataVaultTransformDecode.python.md
index 04db532b..4f63e3e1 100644
--- a/docs/dataVaultTransformDecode.python.md
+++ b/docs/dataVaultTransformDecode.python.md
@@ -4,7 +4,7 @@
### DataVaultTransformDecode
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode vault_transform_decode}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode vault_transform_decode}.
#### Initializers
@@ -50,7 +50,7 @@ dataVaultTransformDecode.DataVaultTransformDecode(
| batch_input
| typing.Union[cdktf.IResolvable, typing.List[typing.Mapping[str]]]
| Specifies a list of items to be decoded in a single batch. |
| batch_results
| typing.Union[cdktf.IResolvable, typing.List[typing.Mapping[str]]]
| The result of decoding batch_input. |
| decoded_value
| str
| The result of decoding a value. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#id DataVaultTransformDecode#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#id DataVaultTransformDecode#id}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
| transformation
| str
| The transformation to perform. |
| tweak
| str
| The tweak value to use. Only applicable for FPE transformations. |
@@ -124,7 +124,7 @@ Must be unique amongst siblings in the same scope
Path to backend from which to retrieve data.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#path DataVaultTransformDecode#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#path DataVaultTransformDecode#path}
---
@@ -134,7 +134,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#role_name DataVaultTransformDecode#role_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#role_name DataVaultTransformDecode#role_name}
---
@@ -146,7 +146,7 @@ Specifies a list of items to be decoded in a single batch.
If this parameter is set, the top-level parameters 'value', 'transformation' and 'tweak' will be ignored. Each batch item within the list can specify these parameters instead.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#batch_input DataVaultTransformDecode#batch_input}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#batch_input DataVaultTransformDecode#batch_input}
---
@@ -156,7 +156,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The result of decoding batch_input.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#batch_results DataVaultTransformDecode#batch_results}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#batch_results DataVaultTransformDecode#batch_results}
---
@@ -166,7 +166,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The result of decoding a value.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#decoded_value DataVaultTransformDecode#decoded_value}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#decoded_value DataVaultTransformDecode#decoded_value}
---
@@ -174,7 +174,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#id DataVaultTransformDecode#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#id DataVaultTransformDecode#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -187,7 +187,7 @@ If you experience problems setting this value it might not be settable. Please t
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#namespace DataVaultTransformDecode#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#namespace DataVaultTransformDecode#namespace}
---
@@ -199,7 +199,7 @@ The transformation to perform.
If no value is provided and the role contains a single transformation, this value will be inferred from the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#transformation DataVaultTransformDecode#transformation}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#transformation DataVaultTransformDecode#transformation}
---
@@ -209,7 +209,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The tweak value to use. Only applicable for FPE transformations.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#tweak DataVaultTransformDecode#tweak}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#tweak DataVaultTransformDecode#tweak}
---
@@ -219,7 +219,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The value in which to decode.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#value DataVaultTransformDecode#value}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#value DataVaultTransformDecode#value}
---
@@ -634,7 +634,7 @@ The construct id used in the generated config for the DataVaultTransformDecode t
The id of the existing DataVaultTransformDecode that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#import import section} in the documentation of this resource for the id to use
---
@@ -1071,7 +1071,7 @@ dataVaultTransformDecode.DataVaultTransformDecodeConfig(
| batch_input
| typing.Union[cdktf.IResolvable, typing.List[typing.Mapping[str]]]
| Specifies a list of items to be decoded in a single batch. |
| batch_results
| typing.Union[cdktf.IResolvable, typing.List[typing.Mapping[str]]]
| The result of decoding batch_input. |
| decoded_value
| str
| The result of decoding a value. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#id DataVaultTransformDecode#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#id DataVaultTransformDecode#id}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
| transformation
| str
| The transformation to perform. |
| tweak
| str
| The tweak value to use. Only applicable for FPE transformations. |
@@ -1159,7 +1159,7 @@ path: str
Path to backend from which to retrieve data.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#path DataVaultTransformDecode#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#path DataVaultTransformDecode#path}
---
@@ -1173,7 +1173,7 @@ role_name: str
The name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#role_name DataVaultTransformDecode#role_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#role_name DataVaultTransformDecode#role_name}
---
@@ -1189,7 +1189,7 @@ Specifies a list of items to be decoded in a single batch.
If this parameter is set, the top-level parameters 'value', 'transformation' and 'tweak' will be ignored. Each batch item within the list can specify these parameters instead.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#batch_input DataVaultTransformDecode#batch_input}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#batch_input DataVaultTransformDecode#batch_input}
---
@@ -1203,7 +1203,7 @@ batch_results: typing.Union[IResolvable, typing.List[typing.Mapping[str]]]
The result of decoding batch_input.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#batch_results DataVaultTransformDecode#batch_results}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#batch_results DataVaultTransformDecode#batch_results}
---
@@ -1217,7 +1217,7 @@ decoded_value: str
The result of decoding a value.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#decoded_value DataVaultTransformDecode#decoded_value}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#decoded_value DataVaultTransformDecode#decoded_value}
---
@@ -1229,7 +1229,7 @@ id: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#id DataVaultTransformDecode#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#id DataVaultTransformDecode#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1246,7 +1246,7 @@ namespace: str
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#namespace DataVaultTransformDecode#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#namespace DataVaultTransformDecode#namespace}
---
@@ -1262,7 +1262,7 @@ The transformation to perform.
If no value is provided and the role contains a single transformation, this value will be inferred from the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#transformation DataVaultTransformDecode#transformation}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#transformation DataVaultTransformDecode#transformation}
---
@@ -1276,7 +1276,7 @@ tweak: str
The tweak value to use. Only applicable for FPE transformations.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#tweak DataVaultTransformDecode#tweak}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#tweak DataVaultTransformDecode#tweak}
---
@@ -1290,7 +1290,7 @@ value: str
The value in which to decode.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#value DataVaultTransformDecode#value}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#value DataVaultTransformDecode#value}
---
diff --git a/docs/dataVaultTransformDecode.typescript.md b/docs/dataVaultTransformDecode.typescript.md
index 832b38f9..c10b22bd 100644
--- a/docs/dataVaultTransformDecode.typescript.md
+++ b/docs/dataVaultTransformDecode.typescript.md
@@ -4,7 +4,7 @@
### DataVaultTransformDecode
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode vault_transform_decode}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode vault_transform_decode}.
#### Initializers
@@ -421,7 +421,7 @@ The construct id used in the generated config for the DataVaultTransformDecode t
The id of the existing DataVaultTransformDecode that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#import import section} in the documentation of this resource for the id to use
---
@@ -840,7 +840,7 @@ const dataVaultTransformDecodeConfig: dataVaultTransformDecode.DataVaultTransfor
| batchInput
| cdktf.IResolvable \| {[ key: string ]: string}[]
| Specifies a list of items to be decoded in a single batch. |
| batchResults
| cdktf.IResolvable \| {[ key: string ]: string}[]
| The result of decoding batch_input. |
| decodedValue
| string
| The result of decoding a value. |
-| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#id DataVaultTransformDecode#id}. |
+| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#id DataVaultTransformDecode#id}. |
| namespace
| string
| Target namespace. (requires Enterprise). |
| transformation
| string
| The transformation to perform. |
| tweak
| string
| The tweak value to use. Only applicable for FPE transformations. |
@@ -928,7 +928,7 @@ public readonly path: string;
Path to backend from which to retrieve data.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#path DataVaultTransformDecode#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#path DataVaultTransformDecode#path}
---
@@ -942,7 +942,7 @@ public readonly roleName: string;
The name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#role_name DataVaultTransformDecode#role_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#role_name DataVaultTransformDecode#role_name}
---
@@ -958,7 +958,7 @@ Specifies a list of items to be decoded in a single batch.
If this parameter is set, the top-level parameters 'value', 'transformation' and 'tweak' will be ignored. Each batch item within the list can specify these parameters instead.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#batch_input DataVaultTransformDecode#batch_input}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#batch_input DataVaultTransformDecode#batch_input}
---
@@ -972,7 +972,7 @@ public readonly batchResults: IResolvable | {[ key: string ]: string}[];
The result of decoding batch_input.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#batch_results DataVaultTransformDecode#batch_results}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#batch_results DataVaultTransformDecode#batch_results}
---
@@ -986,7 +986,7 @@ public readonly decodedValue: string;
The result of decoding a value.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#decoded_value DataVaultTransformDecode#decoded_value}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#decoded_value DataVaultTransformDecode#decoded_value}
---
@@ -998,7 +998,7 @@ public readonly id: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#id DataVaultTransformDecode#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#id DataVaultTransformDecode#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1015,7 +1015,7 @@ public readonly namespace: string;
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#namespace DataVaultTransformDecode#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#namespace DataVaultTransformDecode#namespace}
---
@@ -1031,7 +1031,7 @@ The transformation to perform.
If no value is provided and the role contains a single transformation, this value will be inferred from the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#transformation DataVaultTransformDecode#transformation}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#transformation DataVaultTransformDecode#transformation}
---
@@ -1045,7 +1045,7 @@ public readonly tweak: string;
The tweak value to use. Only applicable for FPE transformations.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#tweak DataVaultTransformDecode#tweak}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#tweak DataVaultTransformDecode#tweak}
---
@@ -1059,7 +1059,7 @@ public readonly value: string;
The value in which to decode.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#value DataVaultTransformDecode#value}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#value DataVaultTransformDecode#value}
---
diff --git a/docs/dataVaultTransformEncode.csharp.md b/docs/dataVaultTransformEncode.csharp.md
index 6d09635e..851f323f 100644
--- a/docs/dataVaultTransformEncode.csharp.md
+++ b/docs/dataVaultTransformEncode.csharp.md
@@ -4,7 +4,7 @@
### DataVaultTransformEncode
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode vault_transform_encode}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode vault_transform_encode}.
#### Initializers
@@ -421,7 +421,7 @@ The construct id used in the generated config for the DataVaultTransformEncode t
The id of the existing DataVaultTransformEncode that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#import import section} in the documentation of this resource for the id to use
---
@@ -858,7 +858,7 @@ new DataVaultTransformEncodeConfig {
| BatchInput
| object
| Specifies a list of items to be encoded in a single batch. |
| BatchResults
| object
| The result of encoding batch_input. |
| EncodedValue
| string
| The result of encoding a value. |
-| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#id DataVaultTransformEncode#id}. |
+| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#id DataVaultTransformEncode#id}. |
| Namespace
| string
| Target namespace. (requires Enterprise). |
| Transformation
| string
| The transformation to perform. |
| Tweak
| string
| The tweak value to use. Only applicable for FPE transformations. |
@@ -946,7 +946,7 @@ public string Path { get; set; }
Path to backend from which to retrieve data.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#path DataVaultTransformEncode#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#path DataVaultTransformEncode#path}
---
@@ -960,7 +960,7 @@ public string RoleName { get; set; }
The name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#role_name DataVaultTransformEncode#role_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#role_name DataVaultTransformEncode#role_name}
---
@@ -976,7 +976,7 @@ Specifies a list of items to be encoded in a single batch.
If this parameter is set, the parameters 'value', 'transformation' and 'tweak' will be ignored. Each batch item within the list can specify these parameters instead.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#batch_input DataVaultTransformEncode#batch_input}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#batch_input DataVaultTransformEncode#batch_input}
---
@@ -990,7 +990,7 @@ public object BatchResults { get; set; }
The result of encoding batch_input.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#batch_results DataVaultTransformEncode#batch_results}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#batch_results DataVaultTransformEncode#batch_results}
---
@@ -1004,7 +1004,7 @@ public string EncodedValue { get; set; }
The result of encoding a value.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#encoded_value DataVaultTransformEncode#encoded_value}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#encoded_value DataVaultTransformEncode#encoded_value}
---
@@ -1016,7 +1016,7 @@ public string Id { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#id DataVaultTransformEncode#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#id DataVaultTransformEncode#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1033,7 +1033,7 @@ public string Namespace { get; set; }
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#namespace DataVaultTransformEncode#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#namespace DataVaultTransformEncode#namespace}
---
@@ -1049,7 +1049,7 @@ The transformation to perform.
If no value is provided and the role contains a single transformation, this value will be inferred from the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#transformation DataVaultTransformEncode#transformation}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#transformation DataVaultTransformEncode#transformation}
---
@@ -1063,7 +1063,7 @@ public string Tweak { get; set; }
The tweak value to use. Only applicable for FPE transformations.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#tweak DataVaultTransformEncode#tweak}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#tweak DataVaultTransformEncode#tweak}
---
@@ -1077,7 +1077,7 @@ public string Value { get; set; }
The value in which to encode.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#value DataVaultTransformEncode#value}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#value DataVaultTransformEncode#value}
---
diff --git a/docs/dataVaultTransformEncode.go.md b/docs/dataVaultTransformEncode.go.md
index e6c8c2b9..cff13494 100644
--- a/docs/dataVaultTransformEncode.go.md
+++ b/docs/dataVaultTransformEncode.go.md
@@ -4,7 +4,7 @@
### DataVaultTransformEncode
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode vault_transform_encode}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode vault_transform_encode}.
#### Initializers
@@ -421,7 +421,7 @@ The construct id used in the generated config for the DataVaultTransformEncode t
The id of the existing DataVaultTransformEncode that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#import import section} in the documentation of this resource for the id to use
---
@@ -858,7 +858,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaulttransformenc
| BatchInput
| interface{}
| Specifies a list of items to be encoded in a single batch. |
| BatchResults
| interface{}
| The result of encoding batch_input. |
| EncodedValue
| *string
| The result of encoding a value. |
-| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#id DataVaultTransformEncode#id}. |
+| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#id DataVaultTransformEncode#id}. |
| Namespace
| *string
| Target namespace. (requires Enterprise). |
| Transformation
| *string
| The transformation to perform. |
| Tweak
| *string
| The tweak value to use. Only applicable for FPE transformations. |
@@ -946,7 +946,7 @@ Path *string
Path to backend from which to retrieve data.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#path DataVaultTransformEncode#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#path DataVaultTransformEncode#path}
---
@@ -960,7 +960,7 @@ RoleName *string
The name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#role_name DataVaultTransformEncode#role_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#role_name DataVaultTransformEncode#role_name}
---
@@ -976,7 +976,7 @@ Specifies a list of items to be encoded in a single batch.
If this parameter is set, the parameters 'value', 'transformation' and 'tweak' will be ignored. Each batch item within the list can specify these parameters instead.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#batch_input DataVaultTransformEncode#batch_input}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#batch_input DataVaultTransformEncode#batch_input}
---
@@ -990,7 +990,7 @@ BatchResults interface{}
The result of encoding batch_input.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#batch_results DataVaultTransformEncode#batch_results}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#batch_results DataVaultTransformEncode#batch_results}
---
@@ -1004,7 +1004,7 @@ EncodedValue *string
The result of encoding a value.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#encoded_value DataVaultTransformEncode#encoded_value}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#encoded_value DataVaultTransformEncode#encoded_value}
---
@@ -1016,7 +1016,7 @@ Id *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#id DataVaultTransformEncode#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#id DataVaultTransformEncode#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1033,7 +1033,7 @@ Namespace *string
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#namespace DataVaultTransformEncode#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#namespace DataVaultTransformEncode#namespace}
---
@@ -1049,7 +1049,7 @@ The transformation to perform.
If no value is provided and the role contains a single transformation, this value will be inferred from the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#transformation DataVaultTransformEncode#transformation}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#transformation DataVaultTransformEncode#transformation}
---
@@ -1063,7 +1063,7 @@ Tweak *string
The tweak value to use. Only applicable for FPE transformations.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#tweak DataVaultTransformEncode#tweak}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#tweak DataVaultTransformEncode#tweak}
---
@@ -1077,7 +1077,7 @@ Value *string
The value in which to encode.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#value DataVaultTransformEncode#value}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#value DataVaultTransformEncode#value}
---
diff --git a/docs/dataVaultTransformEncode.java.md b/docs/dataVaultTransformEncode.java.md
index 0c78f4a0..46d62d5f 100644
--- a/docs/dataVaultTransformEncode.java.md
+++ b/docs/dataVaultTransformEncode.java.md
@@ -4,7 +4,7 @@
### DataVaultTransformEncode
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode vault_transform_encode}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode vault_transform_encode}.
#### Initializers
@@ -54,7 +54,7 @@ DataVaultTransformEncode.Builder.create(Construct scope, java.lang.String id)
| batchInput
| com.hashicorp.cdktf.IResolvable OR java.util.List>
| Specifies a list of items to be encoded in a single batch. |
| batchResults
| com.hashicorp.cdktf.IResolvable OR java.util.List>
| The result of encoding batch_input. |
| encodedValue
| java.lang.String
| The result of encoding a value. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#id DataVaultTransformEncode#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#id DataVaultTransformEncode#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
| transformation
| java.lang.String
| The transformation to perform. |
| tweak
| java.lang.String
| The tweak value to use. Only applicable for FPE transformations. |
@@ -128,7 +128,7 @@ Must be unique amongst siblings in the same scope
Path to backend from which to retrieve data.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#path DataVaultTransformEncode#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#path DataVaultTransformEncode#path}
---
@@ -138,7 +138,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#role_name DataVaultTransformEncode#role_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#role_name DataVaultTransformEncode#role_name}
---
@@ -150,7 +150,7 @@ Specifies a list of items to be encoded in a single batch.
If this parameter is set, the parameters 'value', 'transformation' and 'tweak' will be ignored. Each batch item within the list can specify these parameters instead.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#batch_input DataVaultTransformEncode#batch_input}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#batch_input DataVaultTransformEncode#batch_input}
---
@@ -160,7 +160,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The result of encoding batch_input.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#batch_results DataVaultTransformEncode#batch_results}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#batch_results DataVaultTransformEncode#batch_results}
---
@@ -170,7 +170,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The result of encoding a value.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#encoded_value DataVaultTransformEncode#encoded_value}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#encoded_value DataVaultTransformEncode#encoded_value}
---
@@ -178,7 +178,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#id DataVaultTransformEncode#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#id DataVaultTransformEncode#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -191,7 +191,7 @@ If you experience problems setting this value it might not be settable. Please t
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#namespace DataVaultTransformEncode#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#namespace DataVaultTransformEncode#namespace}
---
@@ -203,7 +203,7 @@ The transformation to perform.
If no value is provided and the role contains a single transformation, this value will be inferred from the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#transformation DataVaultTransformEncode#transformation}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#transformation DataVaultTransformEncode#transformation}
---
@@ -213,7 +213,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The tweak value to use. Only applicable for FPE transformations.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#tweak DataVaultTransformEncode#tweak}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#tweak DataVaultTransformEncode#tweak}
---
@@ -223,7 +223,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The value in which to encode.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#value DataVaultTransformEncode#value}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#value DataVaultTransformEncode#value}
---
@@ -602,7 +602,7 @@ The construct id used in the generated config for the DataVaultTransformEncode t
The id of the existing DataVaultTransformEncode that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#import import section} in the documentation of this resource for the id to use
---
@@ -1045,7 +1045,7 @@ DataVaultTransformEncodeConfig.builder()
| batchInput
| com.hashicorp.cdktf.IResolvable OR java.util.List>
| Specifies a list of items to be encoded in a single batch. |
| batchResults
| com.hashicorp.cdktf.IResolvable OR java.util.List>
| The result of encoding batch_input. |
| encodedValue
| java.lang.String
| The result of encoding a value. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#id DataVaultTransformEncode#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#id DataVaultTransformEncode#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
| transformation
| java.lang.String
| The transformation to perform. |
| tweak
| java.lang.String
| The tweak value to use. Only applicable for FPE transformations. |
@@ -1133,7 +1133,7 @@ public java.lang.String getPath();
Path to backend from which to retrieve data.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#path DataVaultTransformEncode#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#path DataVaultTransformEncode#path}
---
@@ -1147,7 +1147,7 @@ public java.lang.String getRoleName();
The name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#role_name DataVaultTransformEncode#role_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#role_name DataVaultTransformEncode#role_name}
---
@@ -1163,7 +1163,7 @@ Specifies a list of items to be encoded in a single batch.
If this parameter is set, the parameters 'value', 'transformation' and 'tweak' will be ignored. Each batch item within the list can specify these parameters instead.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#batch_input DataVaultTransformEncode#batch_input}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#batch_input DataVaultTransformEncode#batch_input}
---
@@ -1177,7 +1177,7 @@ public java.lang.Object getBatchResults();
The result of encoding batch_input.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#batch_results DataVaultTransformEncode#batch_results}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#batch_results DataVaultTransformEncode#batch_results}
---
@@ -1191,7 +1191,7 @@ public java.lang.String getEncodedValue();
The result of encoding a value.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#encoded_value DataVaultTransformEncode#encoded_value}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#encoded_value DataVaultTransformEncode#encoded_value}
---
@@ -1203,7 +1203,7 @@ public java.lang.String getId();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#id DataVaultTransformEncode#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#id DataVaultTransformEncode#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1220,7 +1220,7 @@ public java.lang.String getNamespace();
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#namespace DataVaultTransformEncode#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#namespace DataVaultTransformEncode#namespace}
---
@@ -1236,7 +1236,7 @@ The transformation to perform.
If no value is provided and the role contains a single transformation, this value will be inferred from the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#transformation DataVaultTransformEncode#transformation}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#transformation DataVaultTransformEncode#transformation}
---
@@ -1250,7 +1250,7 @@ public java.lang.String getTweak();
The tweak value to use. Only applicable for FPE transformations.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#tweak DataVaultTransformEncode#tweak}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#tweak DataVaultTransformEncode#tweak}
---
@@ -1264,7 +1264,7 @@ public java.lang.String getValue();
The value in which to encode.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#value DataVaultTransformEncode#value}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#value DataVaultTransformEncode#value}
---
diff --git a/docs/dataVaultTransformEncode.python.md b/docs/dataVaultTransformEncode.python.md
index 101ae0ea..efd5736d 100644
--- a/docs/dataVaultTransformEncode.python.md
+++ b/docs/dataVaultTransformEncode.python.md
@@ -4,7 +4,7 @@
### DataVaultTransformEncode
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode vault_transform_encode}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode vault_transform_encode}.
#### Initializers
@@ -50,7 +50,7 @@ dataVaultTransformEncode.DataVaultTransformEncode(
| batch_input
| typing.Union[cdktf.IResolvable, typing.List[typing.Mapping[str]]]
| Specifies a list of items to be encoded in a single batch. |
| batch_results
| typing.Union[cdktf.IResolvable, typing.List[typing.Mapping[str]]]
| The result of encoding batch_input. |
| encoded_value
| str
| The result of encoding a value. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#id DataVaultTransformEncode#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#id DataVaultTransformEncode#id}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
| transformation
| str
| The transformation to perform. |
| tweak
| str
| The tweak value to use. Only applicable for FPE transformations. |
@@ -124,7 +124,7 @@ Must be unique amongst siblings in the same scope
Path to backend from which to retrieve data.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#path DataVaultTransformEncode#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#path DataVaultTransformEncode#path}
---
@@ -134,7 +134,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#role_name DataVaultTransformEncode#role_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#role_name DataVaultTransformEncode#role_name}
---
@@ -146,7 +146,7 @@ Specifies a list of items to be encoded in a single batch.
If this parameter is set, the parameters 'value', 'transformation' and 'tweak' will be ignored. Each batch item within the list can specify these parameters instead.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#batch_input DataVaultTransformEncode#batch_input}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#batch_input DataVaultTransformEncode#batch_input}
---
@@ -156,7 +156,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The result of encoding batch_input.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#batch_results DataVaultTransformEncode#batch_results}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#batch_results DataVaultTransformEncode#batch_results}
---
@@ -166,7 +166,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The result of encoding a value.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#encoded_value DataVaultTransformEncode#encoded_value}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#encoded_value DataVaultTransformEncode#encoded_value}
---
@@ -174,7 +174,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#id DataVaultTransformEncode#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#id DataVaultTransformEncode#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -187,7 +187,7 @@ If you experience problems setting this value it might not be settable. Please t
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#namespace DataVaultTransformEncode#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#namespace DataVaultTransformEncode#namespace}
---
@@ -199,7 +199,7 @@ The transformation to perform.
If no value is provided and the role contains a single transformation, this value will be inferred from the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#transformation DataVaultTransformEncode#transformation}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#transformation DataVaultTransformEncode#transformation}
---
@@ -209,7 +209,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The tweak value to use. Only applicable for FPE transformations.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#tweak DataVaultTransformEncode#tweak}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#tweak DataVaultTransformEncode#tweak}
---
@@ -219,7 +219,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The value in which to encode.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#value DataVaultTransformEncode#value}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#value DataVaultTransformEncode#value}
---
@@ -634,7 +634,7 @@ The construct id used in the generated config for the DataVaultTransformEncode t
The id of the existing DataVaultTransformEncode that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#import import section} in the documentation of this resource for the id to use
---
@@ -1071,7 +1071,7 @@ dataVaultTransformEncode.DataVaultTransformEncodeConfig(
| batch_input
| typing.Union[cdktf.IResolvable, typing.List[typing.Mapping[str]]]
| Specifies a list of items to be encoded in a single batch. |
| batch_results
| typing.Union[cdktf.IResolvable, typing.List[typing.Mapping[str]]]
| The result of encoding batch_input. |
| encoded_value
| str
| The result of encoding a value. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#id DataVaultTransformEncode#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#id DataVaultTransformEncode#id}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
| transformation
| str
| The transformation to perform. |
| tweak
| str
| The tweak value to use. Only applicable for FPE transformations. |
@@ -1159,7 +1159,7 @@ path: str
Path to backend from which to retrieve data.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#path DataVaultTransformEncode#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#path DataVaultTransformEncode#path}
---
@@ -1173,7 +1173,7 @@ role_name: str
The name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#role_name DataVaultTransformEncode#role_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#role_name DataVaultTransformEncode#role_name}
---
@@ -1189,7 +1189,7 @@ Specifies a list of items to be encoded in a single batch.
If this parameter is set, the parameters 'value', 'transformation' and 'tweak' will be ignored. Each batch item within the list can specify these parameters instead.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#batch_input DataVaultTransformEncode#batch_input}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#batch_input DataVaultTransformEncode#batch_input}
---
@@ -1203,7 +1203,7 @@ batch_results: typing.Union[IResolvable, typing.List[typing.Mapping[str]]]
The result of encoding batch_input.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#batch_results DataVaultTransformEncode#batch_results}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#batch_results DataVaultTransformEncode#batch_results}
---
@@ -1217,7 +1217,7 @@ encoded_value: str
The result of encoding a value.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#encoded_value DataVaultTransformEncode#encoded_value}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#encoded_value DataVaultTransformEncode#encoded_value}
---
@@ -1229,7 +1229,7 @@ id: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#id DataVaultTransformEncode#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#id DataVaultTransformEncode#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1246,7 +1246,7 @@ namespace: str
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#namespace DataVaultTransformEncode#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#namespace DataVaultTransformEncode#namespace}
---
@@ -1262,7 +1262,7 @@ The transformation to perform.
If no value is provided and the role contains a single transformation, this value will be inferred from the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#transformation DataVaultTransformEncode#transformation}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#transformation DataVaultTransformEncode#transformation}
---
@@ -1276,7 +1276,7 @@ tweak: str
The tweak value to use. Only applicable for FPE transformations.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#tweak DataVaultTransformEncode#tweak}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#tweak DataVaultTransformEncode#tweak}
---
@@ -1290,7 +1290,7 @@ value: str
The value in which to encode.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#value DataVaultTransformEncode#value}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#value DataVaultTransformEncode#value}
---
diff --git a/docs/dataVaultTransformEncode.typescript.md b/docs/dataVaultTransformEncode.typescript.md
index 1dfe39b6..e7818e59 100644
--- a/docs/dataVaultTransformEncode.typescript.md
+++ b/docs/dataVaultTransformEncode.typescript.md
@@ -4,7 +4,7 @@
### DataVaultTransformEncode
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode vault_transform_encode}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode vault_transform_encode}.
#### Initializers
@@ -421,7 +421,7 @@ The construct id used in the generated config for the DataVaultTransformEncode t
The id of the existing DataVaultTransformEncode that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#import import section} in the documentation of this resource for the id to use
---
@@ -840,7 +840,7 @@ const dataVaultTransformEncodeConfig: dataVaultTransformEncode.DataVaultTransfor
| batchInput
| cdktf.IResolvable \| {[ key: string ]: string}[]
| Specifies a list of items to be encoded in a single batch. |
| batchResults
| cdktf.IResolvable \| {[ key: string ]: string}[]
| The result of encoding batch_input. |
| encodedValue
| string
| The result of encoding a value. |
-| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#id DataVaultTransformEncode#id}. |
+| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#id DataVaultTransformEncode#id}. |
| namespace
| string
| Target namespace. (requires Enterprise). |
| transformation
| string
| The transformation to perform. |
| tweak
| string
| The tweak value to use. Only applicable for FPE transformations. |
@@ -928,7 +928,7 @@ public readonly path: string;
Path to backend from which to retrieve data.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#path DataVaultTransformEncode#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#path DataVaultTransformEncode#path}
---
@@ -942,7 +942,7 @@ public readonly roleName: string;
The name of the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#role_name DataVaultTransformEncode#role_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#role_name DataVaultTransformEncode#role_name}
---
@@ -958,7 +958,7 @@ Specifies a list of items to be encoded in a single batch.
If this parameter is set, the parameters 'value', 'transformation' and 'tweak' will be ignored. Each batch item within the list can specify these parameters instead.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#batch_input DataVaultTransformEncode#batch_input}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#batch_input DataVaultTransformEncode#batch_input}
---
@@ -972,7 +972,7 @@ public readonly batchResults: IResolvable | {[ key: string ]: string}[];
The result of encoding batch_input.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#batch_results DataVaultTransformEncode#batch_results}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#batch_results DataVaultTransformEncode#batch_results}
---
@@ -986,7 +986,7 @@ public readonly encodedValue: string;
The result of encoding a value.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#encoded_value DataVaultTransformEncode#encoded_value}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#encoded_value DataVaultTransformEncode#encoded_value}
---
@@ -998,7 +998,7 @@ public readonly id: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#id DataVaultTransformEncode#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#id DataVaultTransformEncode#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1015,7 +1015,7 @@ public readonly namespace: string;
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#namespace DataVaultTransformEncode#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#namespace DataVaultTransformEncode#namespace}
---
@@ -1031,7 +1031,7 @@ The transformation to perform.
If no value is provided and the role contains a single transformation, this value will be inferred from the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#transformation DataVaultTransformEncode#transformation}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#transformation DataVaultTransformEncode#transformation}
---
@@ -1045,7 +1045,7 @@ public readonly tweak: string;
The tweak value to use. Only applicable for FPE transformations.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#tweak DataVaultTransformEncode#tweak}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#tweak DataVaultTransformEncode#tweak}
---
@@ -1059,7 +1059,7 @@ public readonly value: string;
The value in which to encode.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#value DataVaultTransformEncode#value}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#value DataVaultTransformEncode#value}
---
diff --git a/docs/dataVaultTransitDecrypt.csharp.md b/docs/dataVaultTransitDecrypt.csharp.md
index c4a4d788..945e130c 100644
--- a/docs/dataVaultTransitDecrypt.csharp.md
+++ b/docs/dataVaultTransitDecrypt.csharp.md
@@ -4,7 +4,7 @@
### DataVaultTransitDecrypt
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt vault_transit_decrypt}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt vault_transit_decrypt}.
#### Initializers
@@ -386,7 +386,7 @@ The construct id used in the generated config for the DataVaultTransitDecrypt to
The id of the existing DataVaultTransitDecrypt that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#import import section} in the documentation of this resource for the id to use
---
@@ -741,7 +741,7 @@ new DataVaultTransitDecryptConfig {
| Ciphertext
| string
| Transit encrypted cipher text. |
| Key
| string
| Name of the decryption key to use. |
| Context
| string
| Specifies the context for key derivation. |
-| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#id DataVaultTransitDecrypt#id}. |
+| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#id DataVaultTransitDecrypt#id}. |
| Namespace
| string
| Target namespace. (requires Enterprise). |
---
@@ -826,7 +826,7 @@ public string Backend { get; set; }
The Transit secret backend the key belongs to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#backend DataVaultTransitDecrypt#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#backend DataVaultTransitDecrypt#backend}
---
@@ -840,7 +840,7 @@ public string Ciphertext { get; set; }
Transit encrypted cipher text.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#ciphertext DataVaultTransitDecrypt#ciphertext}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#ciphertext DataVaultTransitDecrypt#ciphertext}
---
@@ -854,7 +854,7 @@ public string Key { get; set; }
Name of the decryption key to use.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#key DataVaultTransitDecrypt#key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#key DataVaultTransitDecrypt#key}
---
@@ -868,7 +868,7 @@ public string Context { get; set; }
Specifies the context for key derivation.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#context DataVaultTransitDecrypt#context}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#context DataVaultTransitDecrypt#context}
---
@@ -880,7 +880,7 @@ public string Id { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#id DataVaultTransitDecrypt#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#id DataVaultTransitDecrypt#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -897,7 +897,7 @@ public string Namespace { get; set; }
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#namespace DataVaultTransitDecrypt#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#namespace DataVaultTransitDecrypt#namespace}
---
diff --git a/docs/dataVaultTransitDecrypt.go.md b/docs/dataVaultTransitDecrypt.go.md
index 251a5acd..1658d077 100644
--- a/docs/dataVaultTransitDecrypt.go.md
+++ b/docs/dataVaultTransitDecrypt.go.md
@@ -4,7 +4,7 @@
### DataVaultTransitDecrypt
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt vault_transit_decrypt}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt vault_transit_decrypt}.
#### Initializers
@@ -386,7 +386,7 @@ The construct id used in the generated config for the DataVaultTransitDecrypt to
The id of the existing DataVaultTransitDecrypt that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#import import section} in the documentation of this resource for the id to use
---
@@ -741,7 +741,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaulttransitdecry
| Ciphertext
| *string
| Transit encrypted cipher text. |
| Key
| *string
| Name of the decryption key to use. |
| Context
| *string
| Specifies the context for key derivation. |
-| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#id DataVaultTransitDecrypt#id}. |
+| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#id DataVaultTransitDecrypt#id}. |
| Namespace
| *string
| Target namespace. (requires Enterprise). |
---
@@ -826,7 +826,7 @@ Backend *string
The Transit secret backend the key belongs to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#backend DataVaultTransitDecrypt#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#backend DataVaultTransitDecrypt#backend}
---
@@ -840,7 +840,7 @@ Ciphertext *string
Transit encrypted cipher text.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#ciphertext DataVaultTransitDecrypt#ciphertext}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#ciphertext DataVaultTransitDecrypt#ciphertext}
---
@@ -854,7 +854,7 @@ Key *string
Name of the decryption key to use.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#key DataVaultTransitDecrypt#key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#key DataVaultTransitDecrypt#key}
---
@@ -868,7 +868,7 @@ Context *string
Specifies the context for key derivation.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#context DataVaultTransitDecrypt#context}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#context DataVaultTransitDecrypt#context}
---
@@ -880,7 +880,7 @@ Id *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#id DataVaultTransitDecrypt#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#id DataVaultTransitDecrypt#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -897,7 +897,7 @@ Namespace *string
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#namespace DataVaultTransitDecrypt#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#namespace DataVaultTransitDecrypt#namespace}
---
diff --git a/docs/dataVaultTransitDecrypt.java.md b/docs/dataVaultTransitDecrypt.java.md
index 043a9161..b597544f 100644
--- a/docs/dataVaultTransitDecrypt.java.md
+++ b/docs/dataVaultTransitDecrypt.java.md
@@ -4,7 +4,7 @@
### DataVaultTransitDecrypt
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt vault_transit_decrypt}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt vault_transit_decrypt}.
#### Initializers
@@ -47,7 +47,7 @@ DataVaultTransitDecrypt.Builder.create(Construct scope, java.lang.String id)
| ciphertext
| java.lang.String
| Transit encrypted cipher text. |
| key
| java.lang.String
| Name of the decryption key to use. |
| context
| java.lang.String
| Specifies the context for key derivation. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#id DataVaultTransitDecrypt#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#id DataVaultTransitDecrypt#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
---
@@ -118,7 +118,7 @@ Must be unique amongst siblings in the same scope
The Transit secret backend the key belongs to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#backend DataVaultTransitDecrypt#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#backend DataVaultTransitDecrypt#backend}
---
@@ -128,7 +128,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Transit encrypted cipher text.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#ciphertext DataVaultTransitDecrypt#ciphertext}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#ciphertext DataVaultTransitDecrypt#ciphertext}
---
@@ -138,7 +138,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Name of the decryption key to use.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#key DataVaultTransitDecrypt#key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#key DataVaultTransitDecrypt#key}
---
@@ -148,7 +148,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Specifies the context for key derivation.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#context DataVaultTransitDecrypt#context}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#context DataVaultTransitDecrypt#context}
---
@@ -156,7 +156,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#id DataVaultTransitDecrypt#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#id DataVaultTransitDecrypt#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -169,7 +169,7 @@ If you experience problems setting this value it might not be settable. Please t
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#namespace DataVaultTransitDecrypt#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#namespace DataVaultTransitDecrypt#namespace}
---
@@ -513,7 +513,7 @@ The construct id used in the generated config for the DataVaultTransitDecrypt to
The id of the existing DataVaultTransitDecrypt that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#import import section} in the documentation of this resource for the id to use
---
@@ -872,7 +872,7 @@ DataVaultTransitDecryptConfig.builder()
| ciphertext
| java.lang.String
| Transit encrypted cipher text. |
| key
| java.lang.String
| Name of the decryption key to use. |
| context
| java.lang.String
| Specifies the context for key derivation. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#id DataVaultTransitDecrypt#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#id DataVaultTransitDecrypt#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
---
@@ -957,7 +957,7 @@ public java.lang.String getBackend();
The Transit secret backend the key belongs to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#backend DataVaultTransitDecrypt#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#backend DataVaultTransitDecrypt#backend}
---
@@ -971,7 +971,7 @@ public java.lang.String getCiphertext();
Transit encrypted cipher text.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#ciphertext DataVaultTransitDecrypt#ciphertext}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#ciphertext DataVaultTransitDecrypt#ciphertext}
---
@@ -985,7 +985,7 @@ public java.lang.String getKey();
Name of the decryption key to use.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#key DataVaultTransitDecrypt#key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#key DataVaultTransitDecrypt#key}
---
@@ -999,7 +999,7 @@ public java.lang.String getContext();
Specifies the context for key derivation.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#context DataVaultTransitDecrypt#context}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#context DataVaultTransitDecrypt#context}
---
@@ -1011,7 +1011,7 @@ public java.lang.String getId();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#id DataVaultTransitDecrypt#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#id DataVaultTransitDecrypt#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1028,7 +1028,7 @@ public java.lang.String getNamespace();
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#namespace DataVaultTransitDecrypt#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#namespace DataVaultTransitDecrypt#namespace}
---
diff --git a/docs/dataVaultTransitDecrypt.python.md b/docs/dataVaultTransitDecrypt.python.md
index 98cc04bd..36ff2844 100644
--- a/docs/dataVaultTransitDecrypt.python.md
+++ b/docs/dataVaultTransitDecrypt.python.md
@@ -4,7 +4,7 @@
### DataVaultTransitDecrypt
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt vault_transit_decrypt}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt vault_transit_decrypt}.
#### Initializers
@@ -45,7 +45,7 @@ dataVaultTransitDecrypt.DataVaultTransitDecrypt(
| ciphertext
| str
| Transit encrypted cipher text. |
| key
| str
| Name of the decryption key to use. |
| context
| str
| Specifies the context for key derivation. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#id DataVaultTransitDecrypt#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#id DataVaultTransitDecrypt#id}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
---
@@ -116,7 +116,7 @@ Must be unique amongst siblings in the same scope
The Transit secret backend the key belongs to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#backend DataVaultTransitDecrypt#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#backend DataVaultTransitDecrypt#backend}
---
@@ -126,7 +126,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Transit encrypted cipher text.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#ciphertext DataVaultTransitDecrypt#ciphertext}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#ciphertext DataVaultTransitDecrypt#ciphertext}
---
@@ -136,7 +136,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Name of the decryption key to use.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#key DataVaultTransitDecrypt#key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#key DataVaultTransitDecrypt#key}
---
@@ -146,7 +146,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Specifies the context for key derivation.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#context DataVaultTransitDecrypt#context}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#context DataVaultTransitDecrypt#context}
---
@@ -154,7 +154,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#id DataVaultTransitDecrypt#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#id DataVaultTransitDecrypt#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -167,7 +167,7 @@ If you experience problems setting this value it might not be settable. Please t
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#namespace DataVaultTransitDecrypt#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#namespace DataVaultTransitDecrypt#namespace}
---
@@ -547,7 +547,7 @@ The construct id used in the generated config for the DataVaultTransitDecrypt to
The id of the existing DataVaultTransitDecrypt that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#import import section} in the documentation of this resource for the id to use
---
@@ -902,7 +902,7 @@ dataVaultTransitDecrypt.DataVaultTransitDecryptConfig(
| ciphertext
| str
| Transit encrypted cipher text. |
| key
| str
| Name of the decryption key to use. |
| context
| str
| Specifies the context for key derivation. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#id DataVaultTransitDecrypt#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#id DataVaultTransitDecrypt#id}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
---
@@ -987,7 +987,7 @@ backend: str
The Transit secret backend the key belongs to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#backend DataVaultTransitDecrypt#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#backend DataVaultTransitDecrypt#backend}
---
@@ -1001,7 +1001,7 @@ ciphertext: str
Transit encrypted cipher text.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#ciphertext DataVaultTransitDecrypt#ciphertext}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#ciphertext DataVaultTransitDecrypt#ciphertext}
---
@@ -1015,7 +1015,7 @@ key: str
Name of the decryption key to use.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#key DataVaultTransitDecrypt#key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#key DataVaultTransitDecrypt#key}
---
@@ -1029,7 +1029,7 @@ context: str
Specifies the context for key derivation.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#context DataVaultTransitDecrypt#context}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#context DataVaultTransitDecrypt#context}
---
@@ -1041,7 +1041,7 @@ id: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#id DataVaultTransitDecrypt#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#id DataVaultTransitDecrypt#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1058,7 +1058,7 @@ namespace: str
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#namespace DataVaultTransitDecrypt#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#namespace DataVaultTransitDecrypt#namespace}
---
diff --git a/docs/dataVaultTransitDecrypt.typescript.md b/docs/dataVaultTransitDecrypt.typescript.md
index 32a8c611..14a482b3 100644
--- a/docs/dataVaultTransitDecrypt.typescript.md
+++ b/docs/dataVaultTransitDecrypt.typescript.md
@@ -4,7 +4,7 @@
### DataVaultTransitDecrypt
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt vault_transit_decrypt}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt vault_transit_decrypt}.
#### Initializers
@@ -386,7 +386,7 @@ The construct id used in the generated config for the DataVaultTransitDecrypt to
The id of the existing DataVaultTransitDecrypt that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#import import section} in the documentation of this resource for the id to use
---
@@ -727,7 +727,7 @@ const dataVaultTransitDecryptConfig: dataVaultTransitDecrypt.DataVaultTransitDec
| ciphertext
| string
| Transit encrypted cipher text. |
| key
| string
| Name of the decryption key to use. |
| context
| string
| Specifies the context for key derivation. |
-| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#id DataVaultTransitDecrypt#id}. |
+| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#id DataVaultTransitDecrypt#id}. |
| namespace
| string
| Target namespace. (requires Enterprise). |
---
@@ -812,7 +812,7 @@ public readonly backend: string;
The Transit secret backend the key belongs to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#backend DataVaultTransitDecrypt#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#backend DataVaultTransitDecrypt#backend}
---
@@ -826,7 +826,7 @@ public readonly ciphertext: string;
Transit encrypted cipher text.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#ciphertext DataVaultTransitDecrypt#ciphertext}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#ciphertext DataVaultTransitDecrypt#ciphertext}
---
@@ -840,7 +840,7 @@ public readonly key: string;
Name of the decryption key to use.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#key DataVaultTransitDecrypt#key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#key DataVaultTransitDecrypt#key}
---
@@ -854,7 +854,7 @@ public readonly context: string;
Specifies the context for key derivation.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#context DataVaultTransitDecrypt#context}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#context DataVaultTransitDecrypt#context}
---
@@ -866,7 +866,7 @@ public readonly id: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#id DataVaultTransitDecrypt#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#id DataVaultTransitDecrypt#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -883,7 +883,7 @@ public readonly namespace: string;
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#namespace DataVaultTransitDecrypt#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#namespace DataVaultTransitDecrypt#namespace}
---
diff --git a/docs/dataVaultTransitEncrypt.csharp.md b/docs/dataVaultTransitEncrypt.csharp.md
index 1e270c55..3ab289f3 100644
--- a/docs/dataVaultTransitEncrypt.csharp.md
+++ b/docs/dataVaultTransitEncrypt.csharp.md
@@ -4,7 +4,7 @@
### DataVaultTransitEncrypt
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt vault_transit_encrypt}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt vault_transit_encrypt}.
#### Initializers
@@ -393,7 +393,7 @@ The construct id used in the generated config for the DataVaultTransitEncrypt to
The id of the existing DataVaultTransitEncrypt that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#import import section} in the documentation of this resource for the id to use
---
@@ -771,7 +771,7 @@ new DataVaultTransitEncryptConfig {
| Key
| string
| Name of the encryption key to use. |
| Plaintext
| string
| Map of strings read from Vault. |
| Context
| string
| Specifies the context for key derivation. |
-| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#id DataVaultTransitEncrypt#id}. |
+| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#id DataVaultTransitEncrypt#id}. |
| KeyVersion
| double
| The version of the key to use for encryption. |
| Namespace
| string
| Target namespace. (requires Enterprise). |
@@ -857,7 +857,7 @@ public string Backend { get; set; }
The Transit secret backend the key belongs to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#backend DataVaultTransitEncrypt#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#backend DataVaultTransitEncrypt#backend}
---
@@ -871,7 +871,7 @@ public string Key { get; set; }
Name of the encryption key to use.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#key DataVaultTransitEncrypt#key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#key DataVaultTransitEncrypt#key}
---
@@ -885,7 +885,7 @@ public string Plaintext { get; set; }
Map of strings read from Vault.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#plaintext DataVaultTransitEncrypt#plaintext}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#plaintext DataVaultTransitEncrypt#plaintext}
---
@@ -899,7 +899,7 @@ public string Context { get; set; }
Specifies the context for key derivation.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#context DataVaultTransitEncrypt#context}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#context DataVaultTransitEncrypt#context}
---
@@ -911,7 +911,7 @@ public string Id { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#id DataVaultTransitEncrypt#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#id DataVaultTransitEncrypt#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -928,7 +928,7 @@ public double KeyVersion { get; set; }
The version of the key to use for encryption.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#key_version DataVaultTransitEncrypt#key_version}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#key_version DataVaultTransitEncrypt#key_version}
---
@@ -942,7 +942,7 @@ public string Namespace { get; set; }
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#namespace DataVaultTransitEncrypt#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#namespace DataVaultTransitEncrypt#namespace}
---
diff --git a/docs/dataVaultTransitEncrypt.go.md b/docs/dataVaultTransitEncrypt.go.md
index 4c744b65..783f7afe 100644
--- a/docs/dataVaultTransitEncrypt.go.md
+++ b/docs/dataVaultTransitEncrypt.go.md
@@ -4,7 +4,7 @@
### DataVaultTransitEncrypt
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt vault_transit_encrypt}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt vault_transit_encrypt}.
#### Initializers
@@ -393,7 +393,7 @@ The construct id used in the generated config for the DataVaultTransitEncrypt to
The id of the existing DataVaultTransitEncrypt that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#import import section} in the documentation of this resource for the id to use
---
@@ -771,7 +771,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaulttransitencry
| Key
| *string
| Name of the encryption key to use. |
| Plaintext
| *string
| Map of strings read from Vault. |
| Context
| *string
| Specifies the context for key derivation. |
-| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#id DataVaultTransitEncrypt#id}. |
+| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#id DataVaultTransitEncrypt#id}. |
| KeyVersion
| *f64
| The version of the key to use for encryption. |
| Namespace
| *string
| Target namespace. (requires Enterprise). |
@@ -857,7 +857,7 @@ Backend *string
The Transit secret backend the key belongs to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#backend DataVaultTransitEncrypt#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#backend DataVaultTransitEncrypt#backend}
---
@@ -871,7 +871,7 @@ Key *string
Name of the encryption key to use.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#key DataVaultTransitEncrypt#key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#key DataVaultTransitEncrypt#key}
---
@@ -885,7 +885,7 @@ Plaintext *string
Map of strings read from Vault.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#plaintext DataVaultTransitEncrypt#plaintext}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#plaintext DataVaultTransitEncrypt#plaintext}
---
@@ -899,7 +899,7 @@ Context *string
Specifies the context for key derivation.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#context DataVaultTransitEncrypt#context}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#context DataVaultTransitEncrypt#context}
---
@@ -911,7 +911,7 @@ Id *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#id DataVaultTransitEncrypt#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#id DataVaultTransitEncrypt#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -928,7 +928,7 @@ KeyVersion *f64
The version of the key to use for encryption.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#key_version DataVaultTransitEncrypt#key_version}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#key_version DataVaultTransitEncrypt#key_version}
---
@@ -942,7 +942,7 @@ Namespace *string
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#namespace DataVaultTransitEncrypt#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#namespace DataVaultTransitEncrypt#namespace}
---
diff --git a/docs/dataVaultTransitEncrypt.java.md b/docs/dataVaultTransitEncrypt.java.md
index b8569fb1..32ff38aa 100644
--- a/docs/dataVaultTransitEncrypt.java.md
+++ b/docs/dataVaultTransitEncrypt.java.md
@@ -4,7 +4,7 @@
### DataVaultTransitEncrypt
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt vault_transit_encrypt}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt vault_transit_encrypt}.
#### Initializers
@@ -48,7 +48,7 @@ DataVaultTransitEncrypt.Builder.create(Construct scope, java.lang.String id)
| key
| java.lang.String
| Name of the encryption key to use. |
| plaintext
| java.lang.String
| Map of strings read from Vault. |
| context
| java.lang.String
| Specifies the context for key derivation. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#id DataVaultTransitEncrypt#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#id DataVaultTransitEncrypt#id}. |
| keyVersion
| java.lang.Number
| The version of the key to use for encryption. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
@@ -120,7 +120,7 @@ Must be unique amongst siblings in the same scope
The Transit secret backend the key belongs to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#backend DataVaultTransitEncrypt#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#backend DataVaultTransitEncrypt#backend}
---
@@ -130,7 +130,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Name of the encryption key to use.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#key DataVaultTransitEncrypt#key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#key DataVaultTransitEncrypt#key}
---
@@ -140,7 +140,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Map of strings read from Vault.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#plaintext DataVaultTransitEncrypt#plaintext}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#plaintext DataVaultTransitEncrypt#plaintext}
---
@@ -150,7 +150,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Specifies the context for key derivation.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#context DataVaultTransitEncrypt#context}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#context DataVaultTransitEncrypt#context}
---
@@ -158,7 +158,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#id DataVaultTransitEncrypt#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#id DataVaultTransitEncrypt#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -171,7 +171,7 @@ If you experience problems setting this value it might not be settable. Please t
The version of the key to use for encryption.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#key_version DataVaultTransitEncrypt#key_version}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#key_version DataVaultTransitEncrypt#key_version}
---
@@ -181,7 +181,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#namespace DataVaultTransitEncrypt#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#namespace DataVaultTransitEncrypt#namespace}
---
@@ -532,7 +532,7 @@ The construct id used in the generated config for the DataVaultTransitEncrypt to
The id of the existing DataVaultTransitEncrypt that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#import import section} in the documentation of this resource for the id to use
---
@@ -914,7 +914,7 @@ DataVaultTransitEncryptConfig.builder()
| key
| java.lang.String
| Name of the encryption key to use. |
| plaintext
| java.lang.String
| Map of strings read from Vault. |
| context
| java.lang.String
| Specifies the context for key derivation. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#id DataVaultTransitEncrypt#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#id DataVaultTransitEncrypt#id}. |
| keyVersion
| java.lang.Number
| The version of the key to use for encryption. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
@@ -1000,7 +1000,7 @@ public java.lang.String getBackend();
The Transit secret backend the key belongs to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#backend DataVaultTransitEncrypt#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#backend DataVaultTransitEncrypt#backend}
---
@@ -1014,7 +1014,7 @@ public java.lang.String getKey();
Name of the encryption key to use.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#key DataVaultTransitEncrypt#key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#key DataVaultTransitEncrypt#key}
---
@@ -1028,7 +1028,7 @@ public java.lang.String getPlaintext();
Map of strings read from Vault.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#plaintext DataVaultTransitEncrypt#plaintext}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#plaintext DataVaultTransitEncrypt#plaintext}
---
@@ -1042,7 +1042,7 @@ public java.lang.String getContext();
Specifies the context for key derivation.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#context DataVaultTransitEncrypt#context}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#context DataVaultTransitEncrypt#context}
---
@@ -1054,7 +1054,7 @@ public java.lang.String getId();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#id DataVaultTransitEncrypt#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#id DataVaultTransitEncrypt#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1071,7 +1071,7 @@ public java.lang.Number getKeyVersion();
The version of the key to use for encryption.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#key_version DataVaultTransitEncrypt#key_version}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#key_version DataVaultTransitEncrypt#key_version}
---
@@ -1085,7 +1085,7 @@ public java.lang.String getNamespace();
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#namespace DataVaultTransitEncrypt#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#namespace DataVaultTransitEncrypt#namespace}
---
diff --git a/docs/dataVaultTransitEncrypt.python.md b/docs/dataVaultTransitEncrypt.python.md
index 94c87030..a4adfe4c 100644
--- a/docs/dataVaultTransitEncrypt.python.md
+++ b/docs/dataVaultTransitEncrypt.python.md
@@ -4,7 +4,7 @@
### DataVaultTransitEncrypt
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt vault_transit_encrypt}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt vault_transit_encrypt}.
#### Initializers
@@ -46,7 +46,7 @@ dataVaultTransitEncrypt.DataVaultTransitEncrypt(
| key
| str
| Name of the encryption key to use. |
| plaintext
| str
| Map of strings read from Vault. |
| context
| str
| Specifies the context for key derivation. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#id DataVaultTransitEncrypt#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#id DataVaultTransitEncrypt#id}. |
| key_version
| typing.Union[int, float]
| The version of the key to use for encryption. |
| namespace
| str
| Target namespace. (requires Enterprise). |
@@ -118,7 +118,7 @@ Must be unique amongst siblings in the same scope
The Transit secret backend the key belongs to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#backend DataVaultTransitEncrypt#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#backend DataVaultTransitEncrypt#backend}
---
@@ -128,7 +128,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Name of the encryption key to use.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#key DataVaultTransitEncrypt#key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#key DataVaultTransitEncrypt#key}
---
@@ -138,7 +138,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Map of strings read from Vault.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#plaintext DataVaultTransitEncrypt#plaintext}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#plaintext DataVaultTransitEncrypt#plaintext}
---
@@ -148,7 +148,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Specifies the context for key derivation.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#context DataVaultTransitEncrypt#context}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#context DataVaultTransitEncrypt#context}
---
@@ -156,7 +156,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#id DataVaultTransitEncrypt#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#id DataVaultTransitEncrypt#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -169,7 +169,7 @@ If you experience problems setting this value it might not be settable. Please t
The version of the key to use for encryption.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#key_version DataVaultTransitEncrypt#key_version}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#key_version DataVaultTransitEncrypt#key_version}
---
@@ -179,7 +179,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#namespace DataVaultTransitEncrypt#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#namespace DataVaultTransitEncrypt#namespace}
---
@@ -566,7 +566,7 @@ The construct id used in the generated config for the DataVaultTransitEncrypt to
The id of the existing DataVaultTransitEncrypt that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#import import section} in the documentation of this resource for the id to use
---
@@ -944,7 +944,7 @@ dataVaultTransitEncrypt.DataVaultTransitEncryptConfig(
| key
| str
| Name of the encryption key to use. |
| plaintext
| str
| Map of strings read from Vault. |
| context
| str
| Specifies the context for key derivation. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#id DataVaultTransitEncrypt#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#id DataVaultTransitEncrypt#id}. |
| key_version
| typing.Union[int, float]
| The version of the key to use for encryption. |
| namespace
| str
| Target namespace. (requires Enterprise). |
@@ -1030,7 +1030,7 @@ backend: str
The Transit secret backend the key belongs to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#backend DataVaultTransitEncrypt#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#backend DataVaultTransitEncrypt#backend}
---
@@ -1044,7 +1044,7 @@ key: str
Name of the encryption key to use.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#key DataVaultTransitEncrypt#key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#key DataVaultTransitEncrypt#key}
---
@@ -1058,7 +1058,7 @@ plaintext: str
Map of strings read from Vault.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#plaintext DataVaultTransitEncrypt#plaintext}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#plaintext DataVaultTransitEncrypt#plaintext}
---
@@ -1072,7 +1072,7 @@ context: str
Specifies the context for key derivation.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#context DataVaultTransitEncrypt#context}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#context DataVaultTransitEncrypt#context}
---
@@ -1084,7 +1084,7 @@ id: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#id DataVaultTransitEncrypt#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#id DataVaultTransitEncrypt#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1101,7 +1101,7 @@ key_version: typing.Union[int, float]
The version of the key to use for encryption.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#key_version DataVaultTransitEncrypt#key_version}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#key_version DataVaultTransitEncrypt#key_version}
---
@@ -1115,7 +1115,7 @@ namespace: str
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#namespace DataVaultTransitEncrypt#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#namespace DataVaultTransitEncrypt#namespace}
---
diff --git a/docs/dataVaultTransitEncrypt.typescript.md b/docs/dataVaultTransitEncrypt.typescript.md
index b4f4fe8e..f129aeb3 100644
--- a/docs/dataVaultTransitEncrypt.typescript.md
+++ b/docs/dataVaultTransitEncrypt.typescript.md
@@ -4,7 +4,7 @@
### DataVaultTransitEncrypt
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt vault_transit_encrypt}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt vault_transit_encrypt}.
#### Initializers
@@ -393,7 +393,7 @@ The construct id used in the generated config for the DataVaultTransitEncrypt to
The id of the existing DataVaultTransitEncrypt that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#import import section} in the documentation of this resource for the id to use
---
@@ -756,7 +756,7 @@ const dataVaultTransitEncryptConfig: dataVaultTransitEncrypt.DataVaultTransitEnc
| key
| string
| Name of the encryption key to use. |
| plaintext
| string
| Map of strings read from Vault. |
| context
| string
| Specifies the context for key derivation. |
-| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#id DataVaultTransitEncrypt#id}. |
+| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#id DataVaultTransitEncrypt#id}. |
| keyVersion
| number
| The version of the key to use for encryption. |
| namespace
| string
| Target namespace. (requires Enterprise). |
@@ -842,7 +842,7 @@ public readonly backend: string;
The Transit secret backend the key belongs to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#backend DataVaultTransitEncrypt#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#backend DataVaultTransitEncrypt#backend}
---
@@ -856,7 +856,7 @@ public readonly key: string;
Name of the encryption key to use.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#key DataVaultTransitEncrypt#key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#key DataVaultTransitEncrypt#key}
---
@@ -870,7 +870,7 @@ public readonly plaintext: string;
Map of strings read from Vault.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#plaintext DataVaultTransitEncrypt#plaintext}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#plaintext DataVaultTransitEncrypt#plaintext}
---
@@ -884,7 +884,7 @@ public readonly context: string;
Specifies the context for key derivation.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#context DataVaultTransitEncrypt#context}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#context DataVaultTransitEncrypt#context}
---
@@ -896,7 +896,7 @@ public readonly id: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#id DataVaultTransitEncrypt#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#id DataVaultTransitEncrypt#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -913,7 +913,7 @@ public readonly keyVersion: number;
The version of the key to use for encryption.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#key_version DataVaultTransitEncrypt#key_version}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#key_version DataVaultTransitEncrypt#key_version}
---
@@ -927,7 +927,7 @@ public readonly namespace: string;
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#namespace DataVaultTransitEncrypt#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#namespace DataVaultTransitEncrypt#namespace}
---
diff --git a/docs/databaseSecretBackendConnection.csharp.md b/docs/databaseSecretBackendConnection.csharp.md
index 5a8e6068..47bc23ad 100644
--- a/docs/databaseSecretBackendConnection.csharp.md
+++ b/docs/databaseSecretBackendConnection.csharp.md
@@ -4,7 +4,7 @@
### DatabaseSecretBackendConnection
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection vault_database_secret_backend_connection}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection vault_database_secret_backend_connection}.
#### Initializers
@@ -876,7 +876,7 @@ The construct id used in the generated config for the DatabaseSecretBackendConne
The id of the existing DatabaseSecretBackendConnection that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#import import section} in the documentation of this resource for the id to use
---
@@ -1681,6 +1681,7 @@ new DatabaseSecretBackendConnectionCassandra {
string PemJson = null,
double Port = null,
double ProtocolVersion = null,
+ object SkipVerification = null,
object Tls = null,
string Username = null
};
@@ -1698,6 +1699,7 @@ new DatabaseSecretBackendConnectionCassandra {
| PemJson
| string
| Specifies JSON containing a certificate and private key; |
| Port
| double
| The transport port to use to connect to Cassandra. |
| ProtocolVersion
| double
| The CQL protocol version to use. |
+| SkipVerification
| object
| Skip permissions checks when a connection to Cassandra is first created. |
| Tls
| object
| Whether to use TLS when connecting to Cassandra. |
| Username
| string
| The username to use when authenticating with Cassandra. |
@@ -1713,7 +1715,7 @@ public double ConnectTimeout { get; set; }
The number of seconds to use as a connection timeout.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connect_timeout DatabaseSecretBackendConnection#connect_timeout}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connect_timeout DatabaseSecretBackendConnection#connect_timeout}
---
@@ -1727,7 +1729,7 @@ public string[] Hosts { get; set; }
Cassandra hosts to connect to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#hosts DatabaseSecretBackendConnection#hosts}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#hosts DatabaseSecretBackendConnection#hosts}
---
@@ -1741,7 +1743,7 @@ public object InsecureTls { get; set; }
Whether to skip verification of the server certificate when using TLS.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls}
---
@@ -1755,7 +1757,7 @@ public string Password { get; set; }
The password to use when authenticating with Cassandra.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
---
@@ -1771,7 +1773,7 @@ Concatenated PEM blocks containing a certificate and private key;
a certificate, private key, and issuing CA certificate; or just a CA certificate.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#pem_bundle DatabaseSecretBackendConnection#pem_bundle}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#pem_bundle DatabaseSecretBackendConnection#pem_bundle}
---
@@ -1787,7 +1789,7 @@ Specifies JSON containing a certificate and private key;
a certificate, private key, and issuing CA certificate; or just a CA certificate.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#pem_json DatabaseSecretBackendConnection#pem_json}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#pem_json DatabaseSecretBackendConnection#pem_json}
---
@@ -1801,7 +1803,7 @@ public double Port { get; set; }
The transport port to use to connect to Cassandra.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port}
---
@@ -1815,7 +1817,23 @@ public double ProtocolVersion { get; set; }
The CQL protocol version to use.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#protocol_version DatabaseSecretBackendConnection#protocol_version}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#protocol_version DatabaseSecretBackendConnection#protocol_version}
+
+---
+
+##### `SkipVerification`Optional
+
+```csharp
+public object SkipVerification { get; set; }
+```
+
+- *Type:* object
+
+Skip permissions checks when a connection to Cassandra is first created.
+
+These checks ensure that Vault is able to create roles, but can be resource intensive in clusters with many roles.
+
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#skip_verification DatabaseSecretBackendConnection#skip_verification}
---
@@ -1829,7 +1847,7 @@ public object Tls { get; set; }
Whether to use TLS when connecting to Cassandra.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls}
---
@@ -1843,7 +1861,7 @@ public string Username { get; set; }
The username to use when authenticating with Cassandra.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
---
@@ -1911,7 +1929,7 @@ new DatabaseSecretBackendConnectionConfig {
| Data
| System.Collections.Generic.IDictionary
| A map of sensitive data to pass to the endpoint. Useful for templated connection strings. |
| Elasticsearch
| DatabaseSecretBackendConnectionElasticsearch
| elasticsearch block. |
| Hana
| DatabaseSecretBackendConnectionHana
| hana block. |
-| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#id DatabaseSecretBackendConnection#id}. |
+| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#id DatabaseSecretBackendConnection#id}. |
| Influxdb
| DatabaseSecretBackendConnectionInfluxdb
| influxdb block. |
| Mongodb
| DatabaseSecretBackendConnectionMongodb
| mongodb block. |
| Mongodbatlas
| DatabaseSecretBackendConnectionMongodbatlas
| mongodbatlas block. |
@@ -2013,7 +2031,7 @@ public string Backend { get; set; }
Unique name of the Vault mount to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#backend DatabaseSecretBackendConnection#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#backend DatabaseSecretBackendConnection#backend}
---
@@ -2027,7 +2045,7 @@ public string Name { get; set; }
Name of the database connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#name DatabaseSecretBackendConnection#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#name DatabaseSecretBackendConnection#name}
---
@@ -2041,7 +2059,7 @@ public string[] AllowedRoles { get; set; }
A list of roles that are allowed to use this connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#allowed_roles DatabaseSecretBackendConnection#allowed_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#allowed_roles DatabaseSecretBackendConnection#allowed_roles}
---
@@ -2055,7 +2073,7 @@ public DatabaseSecretBackendConnectionCassandra Cassandra { get; set; }
cassandra block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#cassandra DatabaseSecretBackendConnection#cassandra}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#cassandra DatabaseSecretBackendConnection#cassandra}
---
@@ -2069,7 +2087,7 @@ public DatabaseSecretBackendConnectionCouchbase Couchbase { get; set; }
couchbase block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#couchbase DatabaseSecretBackendConnection#couchbase}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#couchbase DatabaseSecretBackendConnection#couchbase}
---
@@ -2083,7 +2101,7 @@ public System.Collections.Generic.IDictionary Data { get; set; }
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#data DatabaseSecretBackendConnection#data}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#data DatabaseSecretBackendConnection#data}
---
@@ -2097,7 +2115,7 @@ public DatabaseSecretBackendConnectionElasticsearch Elasticsearch { get; set; }
elasticsearch block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#elasticsearch DatabaseSecretBackendConnection#elasticsearch}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#elasticsearch DatabaseSecretBackendConnection#elasticsearch}
---
@@ -2111,7 +2129,7 @@ public DatabaseSecretBackendConnectionHana Hana { get; set; }
hana block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#hana DatabaseSecretBackendConnection#hana}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#hana DatabaseSecretBackendConnection#hana}
---
@@ -2123,7 +2141,7 @@ public string Id { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#id DatabaseSecretBackendConnection#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#id DatabaseSecretBackendConnection#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -2140,7 +2158,7 @@ public DatabaseSecretBackendConnectionInfluxdb Influxdb { get; set; }
influxdb block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#influxdb DatabaseSecretBackendConnection#influxdb}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#influxdb DatabaseSecretBackendConnection#influxdb}
---
@@ -2154,7 +2172,7 @@ public DatabaseSecretBackendConnectionMongodb Mongodb { get; set; }
mongodb block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#mongodb DatabaseSecretBackendConnection#mongodb}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#mongodb DatabaseSecretBackendConnection#mongodb}
---
@@ -2168,7 +2186,7 @@ public DatabaseSecretBackendConnectionMongodbatlas Mongodbatlas { get; set; }
mongodbatlas block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#mongodbatlas DatabaseSecretBackendConnection#mongodbatlas}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#mongodbatlas DatabaseSecretBackendConnection#mongodbatlas}
---
@@ -2182,7 +2200,7 @@ public DatabaseSecretBackendConnectionMssql Mssql { get; set; }
mssql block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#mssql DatabaseSecretBackendConnection#mssql}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#mssql DatabaseSecretBackendConnection#mssql}
---
@@ -2196,7 +2214,7 @@ public DatabaseSecretBackendConnectionMysql Mysql { get; set; }
mysql block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#mysql DatabaseSecretBackendConnection#mysql}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#mysql DatabaseSecretBackendConnection#mysql}
---
@@ -2210,7 +2228,7 @@ public DatabaseSecretBackendConnectionMysqlAurora MysqlAurora { get; set; }
mysql_aurora block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#mysql_aurora DatabaseSecretBackendConnection#mysql_aurora}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#mysql_aurora DatabaseSecretBackendConnection#mysql_aurora}
---
@@ -2224,7 +2242,7 @@ public DatabaseSecretBackendConnectionMysqlLegacy MysqlLegacy { get; set; }
mysql_legacy block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#mysql_legacy DatabaseSecretBackendConnection#mysql_legacy}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#mysql_legacy DatabaseSecretBackendConnection#mysql_legacy}
---
@@ -2238,7 +2256,7 @@ public DatabaseSecretBackendConnectionMysqlRds MysqlRds { get; set; }
mysql_rds block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#mysql_rds DatabaseSecretBackendConnection#mysql_rds}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#mysql_rds DatabaseSecretBackendConnection#mysql_rds}
---
@@ -2252,7 +2270,7 @@ public string Namespace { get; set; }
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#namespace DatabaseSecretBackendConnection#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#namespace DatabaseSecretBackendConnection#namespace}
---
@@ -2266,7 +2284,7 @@ public DatabaseSecretBackendConnectionOracle Oracle { get; set; }
oracle block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#oracle DatabaseSecretBackendConnection#oracle}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#oracle DatabaseSecretBackendConnection#oracle}
---
@@ -2282,7 +2300,7 @@ Specifies the name of the plugin to use for this connection.
Must be prefixed with the name of one of the supported database engine types.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#plugin_name DatabaseSecretBackendConnection#plugin_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#plugin_name DatabaseSecretBackendConnection#plugin_name}
---
@@ -2296,7 +2314,7 @@ public DatabaseSecretBackendConnectionPostgresql Postgresql { get; set; }
postgresql block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#postgresql DatabaseSecretBackendConnection#postgresql}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#postgresql DatabaseSecretBackendConnection#postgresql}
---
@@ -2310,7 +2328,7 @@ public DatabaseSecretBackendConnectionRedis Redis { get; set; }
redis block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#redis DatabaseSecretBackendConnection#redis}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#redis DatabaseSecretBackendConnection#redis}
---
@@ -2324,7 +2342,7 @@ public DatabaseSecretBackendConnectionRedisElasticache RedisElasticache { get; s
redis_elasticache block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#redis_elasticache DatabaseSecretBackendConnection#redis_elasticache}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#redis_elasticache DatabaseSecretBackendConnection#redis_elasticache}
---
@@ -2338,7 +2356,7 @@ public DatabaseSecretBackendConnectionRedshift Redshift { get; set; }
redshift block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#redshift DatabaseSecretBackendConnection#redshift}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#redshift DatabaseSecretBackendConnection#redshift}
---
@@ -2352,7 +2370,7 @@ public string[] RootRotationStatements { get; set; }
A list of database statements to be executed to rotate the root user's credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#root_rotation_statements DatabaseSecretBackendConnection#root_rotation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#root_rotation_statements DatabaseSecretBackendConnection#root_rotation_statements}
---
@@ -2366,7 +2384,7 @@ public DatabaseSecretBackendConnectionSnowflake Snowflake { get; set; }
snowflake block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#snowflake DatabaseSecretBackendConnection#snowflake}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#snowflake DatabaseSecretBackendConnection#snowflake}
---
@@ -2380,7 +2398,7 @@ public object VerifyConnection { get; set; }
Specifies if the connection is verified during initial configuration.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#verify_connection DatabaseSecretBackendConnection#verify_connection}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#verify_connection DatabaseSecretBackendConnection#verify_connection}
---
@@ -2428,7 +2446,7 @@ public string[] Hosts { get; set; }
A set of Couchbase URIs to connect to. Must use `couchbases://` scheme if `tls` is `true`.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#hosts DatabaseSecretBackendConnection#hosts}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#hosts DatabaseSecretBackendConnection#hosts}
---
@@ -2442,7 +2460,7 @@ public string Password { get; set; }
Specifies the password corresponding to the given username.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
---
@@ -2456,7 +2474,7 @@ public string Username { get; set; }
Specifies the username for Vault to use.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
---
@@ -2472,7 +2490,7 @@ Required if `tls` is `true`.
Specifies the certificate authority of the Couchbase server, as a PEM certificate that has been base64 encoded.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#base64_pem DatabaseSecretBackendConnection#base64_pem}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#base64_pem DatabaseSecretBackendConnection#base64_pem}
---
@@ -2486,7 +2504,7 @@ public string BucketName { get; set; }
Required for Couchbase versions prior to 6.5.0. This is only used to verify vault's connection to the server.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#bucket_name DatabaseSecretBackendConnection#bucket_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#bucket_name DatabaseSecretBackendConnection#bucket_name}
---
@@ -2500,7 +2518,7 @@ public object InsecureTls { get; set; }
Specifies whether to skip verification of the server certificate when using TLS.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls}
---
@@ -2514,7 +2532,7 @@ public object Tls { get; set; }
Specifies whether to use TLS when connecting to Couchbase.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls}
---
@@ -2528,7 +2546,7 @@ public string UsernameTemplate { get; set; }
Template describing how dynamic usernames are generated.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
---
@@ -2580,7 +2598,7 @@ public string Password { get; set; }
The password to be used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
---
@@ -2594,7 +2612,7 @@ public string Url { get; set; }
The URL for Elasticsearch's API.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#url DatabaseSecretBackendConnection#url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#url DatabaseSecretBackendConnection#url}
---
@@ -2608,7 +2626,7 @@ public string Username { get; set; }
The username to be used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
---
@@ -2622,7 +2640,7 @@ public string CaCert { get; set; }
The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#ca_cert DatabaseSecretBackendConnection#ca_cert}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#ca_cert DatabaseSecretBackendConnection#ca_cert}
---
@@ -2636,7 +2654,7 @@ public string CaPath { get; set; }
The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#ca_path DatabaseSecretBackendConnection#ca_path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#ca_path DatabaseSecretBackendConnection#ca_path}
---
@@ -2650,7 +2668,7 @@ public string ClientCert { get; set; }
The path to the certificate for the Elasticsearch client to present for communication.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#client_cert DatabaseSecretBackendConnection#client_cert}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#client_cert DatabaseSecretBackendConnection#client_cert}
---
@@ -2664,7 +2682,7 @@ public string ClientKey { get; set; }
The path to the key for the Elasticsearch client to use for communication.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#client_key DatabaseSecretBackendConnection#client_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#client_key DatabaseSecretBackendConnection#client_key}
---
@@ -2678,7 +2696,7 @@ public object Insecure { get; set; }
Whether to disable certificate verification.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#insecure DatabaseSecretBackendConnection#insecure}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#insecure DatabaseSecretBackendConnection#insecure}
---
@@ -2692,7 +2710,7 @@ public string TlsServerName { get; set; }
This, if set, is used to set the SNI host when connecting via TLS.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_server_name DatabaseSecretBackendConnection#tls_server_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_server_name DatabaseSecretBackendConnection#tls_server_name}
---
@@ -2706,7 +2724,7 @@ public string UsernameTemplate { get; set; }
Template describing how dynamic usernames are generated.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
---
@@ -2752,7 +2770,7 @@ public string ConnectionUrl { get; set; }
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
---
@@ -2766,7 +2784,7 @@ public object DisableEscaping { get; set; }
Disable special character escaping in username and password.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping}
---
@@ -2780,7 +2798,7 @@ public double MaxConnectionLifetime { get; set; }
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
---
@@ -2794,7 +2812,7 @@ public double MaxIdleConnections { get; set; }
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
---
@@ -2808,7 +2826,7 @@ public double MaxOpenConnections { get; set; }
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
---
@@ -2822,7 +2840,7 @@ public string Password { get; set; }
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
---
@@ -2836,7 +2854,7 @@ public string Username { get; set; }
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
---
@@ -2888,7 +2906,7 @@ public string Host { get; set; }
Influxdb host to connect to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#host DatabaseSecretBackendConnection#host}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#host DatabaseSecretBackendConnection#host}
---
@@ -2902,7 +2920,7 @@ public string Password { get; set; }
Specifies the password corresponding to the given username.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
---
@@ -2916,7 +2934,7 @@ public string Username { get; set; }
Specifies the username to use for superuser access.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
---
@@ -2930,7 +2948,7 @@ public double ConnectTimeout { get; set; }
The number of seconds to use as a connection timeout.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connect_timeout DatabaseSecretBackendConnection#connect_timeout}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connect_timeout DatabaseSecretBackendConnection#connect_timeout}
---
@@ -2944,7 +2962,7 @@ public object InsecureTls { get; set; }
Whether to skip verification of the server certificate when using TLS.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls}
---
@@ -2960,7 +2978,7 @@ Concatenated PEM blocks containing a certificate and private key;
a certificate, private key, and issuing CA certificate; or just a CA certificate.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#pem_bundle DatabaseSecretBackendConnection#pem_bundle}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#pem_bundle DatabaseSecretBackendConnection#pem_bundle}
---
@@ -2976,7 +2994,7 @@ Specifies JSON containing a certificate and private key;
a certificate, private key, and issuing CA certificate; or just a CA certificate.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#pem_json DatabaseSecretBackendConnection#pem_json}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#pem_json DatabaseSecretBackendConnection#pem_json}
---
@@ -2990,7 +3008,7 @@ public double Port { get; set; }
The transport port to use to connect to Influxdb.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port}
---
@@ -3004,7 +3022,7 @@ public object Tls { get; set; }
Whether to use TLS when connecting to Influxdb.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls}
---
@@ -3018,7 +3036,7 @@ public string UsernameTemplate { get; set; }
Template describing how dynamic usernames are generated.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
---
@@ -3064,7 +3082,7 @@ public string ConnectionUrl { get; set; }
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
---
@@ -3078,7 +3096,7 @@ public double MaxConnectionLifetime { get; set; }
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
---
@@ -3092,7 +3110,7 @@ public double MaxIdleConnections { get; set; }
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
---
@@ -3106,7 +3124,7 @@ public double MaxOpenConnections { get; set; }
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
---
@@ -3120,7 +3138,7 @@ public string Password { get; set; }
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
---
@@ -3134,7 +3152,7 @@ public string Username { get; set; }
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
---
@@ -3148,7 +3166,7 @@ public string UsernameTemplate { get; set; }
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
---
@@ -3186,7 +3204,7 @@ public string PrivateKey { get; set; }
The Private Programmatic API Key used to connect with MongoDB Atlas API.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#private_key DatabaseSecretBackendConnection#private_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#private_key DatabaseSecretBackendConnection#private_key}
---
@@ -3200,7 +3218,7 @@ public string ProjectId { get; set; }
The Project ID the Database User should be created within.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#project_id DatabaseSecretBackendConnection#project_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#project_id DatabaseSecretBackendConnection#project_id}
---
@@ -3214,7 +3232,7 @@ public string PublicKey { get; set; }
The Public Programmatic API Key used to authenticate with the MongoDB Atlas API.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#public_key DatabaseSecretBackendConnection#public_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#public_key DatabaseSecretBackendConnection#public_key}
---
@@ -3264,7 +3282,7 @@ public string ConnectionUrl { get; set; }
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
---
@@ -3278,7 +3296,7 @@ public object ContainedDb { get; set; }
Set to true when the target is a Contained Database, e.g. AzureSQL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#contained_db DatabaseSecretBackendConnection#contained_db}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#contained_db DatabaseSecretBackendConnection#contained_db}
---
@@ -3292,7 +3310,7 @@ public object DisableEscaping { get; set; }
Disable special character escaping in username and password.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping}
---
@@ -3306,7 +3324,7 @@ public double MaxConnectionLifetime { get; set; }
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
---
@@ -3320,7 +3338,7 @@ public double MaxIdleConnections { get; set; }
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
---
@@ -3334,7 +3352,7 @@ public double MaxOpenConnections { get; set; }
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
---
@@ -3348,7 +3366,7 @@ public string Password { get; set; }
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
---
@@ -3362,7 +3380,7 @@ public string Username { get; set; }
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
---
@@ -3376,7 +3394,7 @@ public string UsernameTemplate { get; set; }
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
---
@@ -3430,7 +3448,7 @@ public string AuthType { get; set; }
Specify alternative authorization type. (Only 'gcp_iam' is valid currently).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type}
---
@@ -3444,7 +3462,7 @@ public string ConnectionUrl { get; set; }
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
---
@@ -3458,7 +3476,7 @@ public double MaxConnectionLifetime { get; set; }
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
---
@@ -3472,7 +3490,7 @@ public double MaxIdleConnections { get; set; }
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
---
@@ -3486,7 +3504,7 @@ public double MaxOpenConnections { get; set; }
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
---
@@ -3500,7 +3518,7 @@ public string Password { get; set; }
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
---
@@ -3514,7 +3532,7 @@ public string ServiceAccountJson { get; set; }
A JSON encoded credential for use with IAM authorization.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json}
---
@@ -3528,7 +3546,7 @@ public string TlsCa { get; set; }
x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca}
---
@@ -3544,7 +3562,7 @@ x509 certificate for connecting to the database.
This must be a PEM encoded version of the private key and the certificate combined.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key}
---
@@ -3558,7 +3576,7 @@ public string Username { get; set; }
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
---
@@ -3572,7 +3590,7 @@ public string UsernameTemplate { get; set; }
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
---
@@ -3626,7 +3644,7 @@ public string AuthType { get; set; }
Specify alternative authorization type. (Only 'gcp_iam' is valid currently).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type}
---
@@ -3640,7 +3658,7 @@ public string ConnectionUrl { get; set; }
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
---
@@ -3654,7 +3672,7 @@ public double MaxConnectionLifetime { get; set; }
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
---
@@ -3668,7 +3686,7 @@ public double MaxIdleConnections { get; set; }
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
---
@@ -3682,7 +3700,7 @@ public double MaxOpenConnections { get; set; }
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
---
@@ -3696,7 +3714,7 @@ public string Password { get; set; }
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
---
@@ -3710,7 +3728,7 @@ public string ServiceAccountJson { get; set; }
A JSON encoded credential for use with IAM authorization.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json}
---
@@ -3724,7 +3742,7 @@ public string TlsCa { get; set; }
x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca}
---
@@ -3740,7 +3758,7 @@ x509 certificate for connecting to the database.
This must be a PEM encoded version of the private key and the certificate combined.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key}
---
@@ -3754,7 +3772,7 @@ public string Username { get; set; }
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
---
@@ -3768,7 +3786,7 @@ public string UsernameTemplate { get; set; }
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
---
@@ -3822,7 +3840,7 @@ public string AuthType { get; set; }
Specify alternative authorization type. (Only 'gcp_iam' is valid currently).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type}
---
@@ -3836,7 +3854,7 @@ public string ConnectionUrl { get; set; }
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
---
@@ -3850,7 +3868,7 @@ public double MaxConnectionLifetime { get; set; }
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
---
@@ -3864,7 +3882,7 @@ public double MaxIdleConnections { get; set; }
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
---
@@ -3878,7 +3896,7 @@ public double MaxOpenConnections { get; set; }
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
---
@@ -3892,7 +3910,7 @@ public string Password { get; set; }
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
---
@@ -3906,7 +3924,7 @@ public string ServiceAccountJson { get; set; }
A JSON encoded credential for use with IAM authorization.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json}
---
@@ -3920,7 +3938,7 @@ public string TlsCa { get; set; }
x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca}
---
@@ -3936,7 +3954,7 @@ x509 certificate for connecting to the database.
This must be a PEM encoded version of the private key and the certificate combined.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key}
---
@@ -3950,7 +3968,7 @@ public string Username { get; set; }
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
---
@@ -3964,7 +3982,7 @@ public string UsernameTemplate { get; set; }
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
---
@@ -4018,7 +4036,7 @@ public string AuthType { get; set; }
Specify alternative authorization type. (Only 'gcp_iam' is valid currently).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type}
---
@@ -4032,7 +4050,7 @@ public string ConnectionUrl { get; set; }
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
---
@@ -4046,7 +4064,7 @@ public double MaxConnectionLifetime { get; set; }
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
---
@@ -4060,7 +4078,7 @@ public double MaxIdleConnections { get; set; }
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
---
@@ -4074,7 +4092,7 @@ public double MaxOpenConnections { get; set; }
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
---
@@ -4088,7 +4106,7 @@ public string Password { get; set; }
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
---
@@ -4102,7 +4120,7 @@ public string ServiceAccountJson { get; set; }
A JSON encoded credential for use with IAM authorization.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json}
---
@@ -4116,7 +4134,7 @@ public string TlsCa { get; set; }
x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca}
---
@@ -4132,7 +4150,7 @@ x509 certificate for connecting to the database.
This must be a PEM encoded version of the private key and the certificate combined.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key}
---
@@ -4146,7 +4164,7 @@ public string Username { get; set; }
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
---
@@ -4160,7 +4178,7 @@ public string UsernameTemplate { get; set; }
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
---
@@ -4210,7 +4228,7 @@ public string ConnectionUrl { get; set; }
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
---
@@ -4224,7 +4242,7 @@ public object DisconnectSessions { get; set; }
Set to true to disconnect any open sessions prior to running the revocation statements.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#disconnect_sessions DatabaseSecretBackendConnection#disconnect_sessions}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#disconnect_sessions DatabaseSecretBackendConnection#disconnect_sessions}
---
@@ -4238,7 +4256,7 @@ public double MaxConnectionLifetime { get; set; }
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
---
@@ -4252,7 +4270,7 @@ public double MaxIdleConnections { get; set; }
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
---
@@ -4266,7 +4284,7 @@ public double MaxOpenConnections { get; set; }
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
---
@@ -4280,7 +4298,7 @@ public string Password { get; set; }
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
---
@@ -4294,7 +4312,7 @@ public object SplitStatements { get; set; }
Set to true in order to split statements after semi-colons.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#split_statements DatabaseSecretBackendConnection#split_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#split_statements DatabaseSecretBackendConnection#split_statements}
---
@@ -4308,7 +4326,7 @@ public string Username { get; set; }
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
---
@@ -4322,7 +4340,7 @@ public string UsernameTemplate { get; set; }
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
---
@@ -4341,7 +4359,11 @@ new DatabaseSecretBackendConnectionPostgresql {
double MaxIdleConnections = null,
double MaxOpenConnections = null,
string Password = null,
+ string PrivateKey = null,
+ object SelfManaged = null,
string ServiceAccountJson = null,
+ string TlsCa = null,
+ string TlsCertificate = null,
string Username = null,
string UsernameTemplate = null
};
@@ -4358,7 +4380,11 @@ new DatabaseSecretBackendConnectionPostgresql {
| MaxIdleConnections
| double
| Maximum number of idle connections to the database. |
| MaxOpenConnections
| double
| Maximum number of open connections to the database. |
| Password
| string
| The root credential password used in the connection URL. |
+| PrivateKey
| string
| The secret key used for the x509 client certificate. Must be PEM encoded. |
+| SelfManaged
| object
| If set, allows onboarding static roles with a rootless connection configuration. |
| ServiceAccountJson
| string
| A JSON encoded credential for use with IAM authorization. |
+| TlsCa
| string
| The x509 CA file for validating the certificate presented by the PostgreSQL server. Must be PEM encoded. |
+| TlsCertificate
| string
| The x509 client certificate for connecting to the database. Must be PEM encoded. |
| Username
| string
| The root credential username used in the connection URL. |
| UsernameTemplate
| string
| Username generation template. |
@@ -4374,7 +4400,7 @@ public string AuthType { get; set; }
Specify alternative authorization type. (Only 'gcp_iam' is valid currently).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type}
---
@@ -4388,7 +4414,7 @@ public string ConnectionUrl { get; set; }
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
---
@@ -4402,7 +4428,7 @@ public object DisableEscaping { get; set; }
Disable special character escaping in username and password.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping}
---
@@ -4416,7 +4442,7 @@ public double MaxConnectionLifetime { get; set; }
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
---
@@ -4430,7 +4456,7 @@ public double MaxIdleConnections { get; set; }
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
---
@@ -4444,7 +4470,7 @@ public double MaxOpenConnections { get; set; }
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
---
@@ -4458,7 +4484,35 @@ public string Password { get; set; }
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+
+---
+
+##### `PrivateKey`Optional
+
+```csharp
+public string PrivateKey { get; set; }
+```
+
+- *Type:* string
+
+The secret key used for the x509 client certificate. Must be PEM encoded.
+
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#private_key DatabaseSecretBackendConnection#private_key}
+
+---
+
+##### `SelfManaged`Optional
+
+```csharp
+public object SelfManaged { get; set; }
+```
+
+- *Type:* object
+
+If set, allows onboarding static roles with a rootless connection configuration.
+
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#self_managed DatabaseSecretBackendConnection#self_managed}
---
@@ -4472,7 +4526,35 @@ public string ServiceAccountJson { get; set; }
A JSON encoded credential for use with IAM authorization.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json}
+
+---
+
+##### `TlsCa`Optional
+
+```csharp
+public string TlsCa { get; set; }
+```
+
+- *Type:* string
+
+The x509 CA file for validating the certificate presented by the PostgreSQL server. Must be PEM encoded.
+
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca}
+
+---
+
+##### `TlsCertificate`Optional
+
+```csharp
+public string TlsCertificate { get; set; }
+```
+
+- *Type:* string
+
+The x509 client certificate for connecting to the database. Must be PEM encoded.
+
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_certificate DatabaseSecretBackendConnection#tls_certificate}
---
@@ -4486,7 +4568,7 @@ public string Username { get; set; }
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
---
@@ -4500,7 +4582,7 @@ public string UsernameTemplate { get; set; }
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
---
@@ -4546,7 +4628,7 @@ public string Host { get; set; }
Specifies the host to connect to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#host DatabaseSecretBackendConnection#host}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#host DatabaseSecretBackendConnection#host}
---
@@ -4560,7 +4642,7 @@ public string Password { get; set; }
Specifies the password corresponding to the given username.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
---
@@ -4574,7 +4656,7 @@ public string Username { get; set; }
Specifies the username for Vault to use.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
---
@@ -4588,7 +4670,7 @@ public string CaCert { get; set; }
The contents of a PEM-encoded CA cert file to use to verify the Redis server's identity.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#ca_cert DatabaseSecretBackendConnection#ca_cert}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#ca_cert DatabaseSecretBackendConnection#ca_cert}
---
@@ -4602,7 +4684,7 @@ public object InsecureTls { get; set; }
Specifies whether to skip verification of the server certificate when using TLS.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls}
---
@@ -4616,7 +4698,7 @@ public double Port { get; set; }
The transport port to use to connect to Redis.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port}
---
@@ -4630,7 +4712,7 @@ public object Tls { get; set; }
Specifies whether to use TLS when connecting to Redis.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls}
---
@@ -4670,7 +4752,7 @@ public string Url { get; set; }
The configuration endpoint for the ElastiCache cluster to connect to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#url DatabaseSecretBackendConnection#url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#url DatabaseSecretBackendConnection#url}
---
@@ -4686,7 +4768,7 @@ The AWS secret key id to use to talk to ElastiCache.
If omitted the credentials chain provider is used instead.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
---
@@ -4702,7 +4784,7 @@ The AWS region where the ElastiCache cluster is hosted.
If omitted the plugin tries to infer the region from the environment.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#region DatabaseSecretBackendConnection#region}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#region DatabaseSecretBackendConnection#region}
---
@@ -4718,7 +4800,7 @@ The AWS access key id to use to talk to ElastiCache.
If omitted the credentials chain provider is used instead.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
---
@@ -4766,7 +4848,7 @@ public string ConnectionUrl { get; set; }
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
---
@@ -4780,7 +4862,7 @@ public object DisableEscaping { get; set; }
Disable special character escaping in username and password.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping}
---
@@ -4794,7 +4876,7 @@ public double MaxConnectionLifetime { get; set; }
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
---
@@ -4808,7 +4890,7 @@ public double MaxIdleConnections { get; set; }
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
---
@@ -4822,7 +4904,7 @@ public double MaxOpenConnections { get; set; }
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
---
@@ -4836,7 +4918,7 @@ public string Password { get; set; }
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
---
@@ -4850,7 +4932,7 @@ public string Username { get; set; }
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
---
@@ -4864,7 +4946,7 @@ public string UsernameTemplate { get; set; }
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
---
@@ -4910,7 +4992,7 @@ public string ConnectionUrl { get; set; }
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
---
@@ -4924,7 +5006,7 @@ public double MaxConnectionLifetime { get; set; }
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
---
@@ -4938,7 +5020,7 @@ public double MaxIdleConnections { get; set; }
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
---
@@ -4952,7 +5034,7 @@ public double MaxOpenConnections { get; set; }
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
---
@@ -4966,7 +5048,7 @@ public string Password { get; set; }
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
---
@@ -4980,7 +5062,7 @@ public string Username { get; set; }
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
---
@@ -4994,7 +5076,7 @@ public string UsernameTemplate { get; set; }
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
---
@@ -5058,6 +5140,7 @@ The attribute on the parent resource this class is referencing.
| ResetPemJson
| *No description.* |
| ResetPort
| *No description.* |
| ResetProtocolVersion
| *No description.* |
+| ResetSkipVerification
| *No description.* |
| ResetTls
| *No description.* |
| ResetUsername
| *No description.* |
@@ -5261,6 +5344,12 @@ private void ResetPort()
private void ResetProtocolVersion()
```
+##### `ResetSkipVerification`
+
+```csharp
+private void ResetSkipVerification()
+```
+
##### `ResetTls`
```csharp
@@ -5288,6 +5377,7 @@ private void ResetUsername()
| PemJsonInput
| string
| *No description.* |
| PortInput
| double
| *No description.* |
| ProtocolVersionInput
| double
| *No description.* |
+| SkipVerificationInput
| object
| *No description.* |
| TlsInput
| object
| *No description.* |
| UsernameInput
| string
| *No description.* |
| ConnectTimeout
| double
| *No description.* |
@@ -5298,6 +5388,7 @@ private void ResetUsername()
| PemJson
| string
| *No description.* |
| Port
| double
| *No description.* |
| ProtocolVersion
| double
| *No description.* |
+| SkipVerification
| object
| *No description.* |
| Tls
| object
| *No description.* |
| Username
| string
| *No description.* |
| InternalValue
| DatabaseSecretBackendConnectionCassandra
| *No description.* |
@@ -5408,6 +5499,16 @@ public double ProtocolVersionInput { get; }
---
+##### `SkipVerificationInput`Optional
+
+```csharp
+public object SkipVerificationInput { get; }
+```
+
+- *Type:* object
+
+---
+
##### `TlsInput`Optional
```csharp
@@ -5508,6 +5609,16 @@ public double ProtocolVersion { get; }
---
+##### `SkipVerification`Required
+
+```csharp
+public object SkipVerification { get; }
+```
+
+- *Type:* object
+
+---
+
##### `Tls`Required
```csharp
@@ -11603,7 +11714,11 @@ The attribute on the parent resource this class is referencing.
| ResetMaxIdleConnections
| *No description.* |
| ResetMaxOpenConnections
| *No description.* |
| ResetPassword
| *No description.* |
+| ResetPrivateKey
| *No description.* |
+| ResetSelfManaged
| *No description.* |
| ResetServiceAccountJson
| *No description.* |
+| ResetTlsCa
| *No description.* |
+| ResetTlsCertificate
| *No description.* |
| ResetUsername
| *No description.* |
| ResetUsernameTemplate
| *No description.* |
@@ -11801,12 +11916,36 @@ private void ResetMaxOpenConnections()
private void ResetPassword()
```
+##### `ResetPrivateKey`
+
+```csharp
+private void ResetPrivateKey()
+```
+
+##### `ResetSelfManaged`
+
+```csharp
+private void ResetSelfManaged()
+```
+
##### `ResetServiceAccountJson`
```csharp
private void ResetServiceAccountJson()
```
+##### `ResetTlsCa`
+
+```csharp
+private void ResetTlsCa()
+```
+
+##### `ResetTlsCertificate`
+
+```csharp
+private void ResetTlsCertificate()
+```
+
##### `ResetUsername`
```csharp
@@ -11833,7 +11972,11 @@ private void ResetUsernameTemplate()
| MaxIdleConnectionsInput
| double
| *No description.* |
| MaxOpenConnectionsInput
| double
| *No description.* |
| PasswordInput
| string
| *No description.* |
+| PrivateKeyInput
| string
| *No description.* |
+| SelfManagedInput
| object
| *No description.* |
| ServiceAccountJsonInput
| string
| *No description.* |
+| TlsCaInput
| string
| *No description.* |
+| TlsCertificateInput
| string
| *No description.* |
| UsernameInput
| string
| *No description.* |
| UsernameTemplateInput
| string
| *No description.* |
| AuthType
| string
| *No description.* |
@@ -11843,7 +11986,11 @@ private void ResetUsernameTemplate()
| MaxIdleConnections
| double
| *No description.* |
| MaxOpenConnections
| double
| *No description.* |
| Password
| string
| *No description.* |
+| PrivateKey
| string
| *No description.* |
+| SelfManaged
| object
| *No description.* |
| ServiceAccountJson
| string
| *No description.* |
+| TlsCa
| string
| *No description.* |
+| TlsCertificate
| string
| *No description.* |
| Username
| string
| *No description.* |
| UsernameTemplate
| string
| *No description.* |
| InternalValue
| DatabaseSecretBackendConnectionPostgresql
| *No description.* |
@@ -11944,6 +12091,26 @@ public string PasswordInput { get; }
---
+##### `PrivateKeyInput`Optional
+
+```csharp
+public string PrivateKeyInput { get; }
+```
+
+- *Type:* string
+
+---
+
+##### `SelfManagedInput`Optional
+
+```csharp
+public object SelfManagedInput { get; }
+```
+
+- *Type:* object
+
+---
+
##### `ServiceAccountJsonInput`Optional
```csharp
@@ -11954,6 +12121,26 @@ public string ServiceAccountJsonInput { get; }
---
+##### `TlsCaInput`Optional
+
+```csharp
+public string TlsCaInput { get; }
+```
+
+- *Type:* string
+
+---
+
+##### `TlsCertificateInput`Optional
+
+```csharp
+public string TlsCertificateInput { get; }
+```
+
+- *Type:* string
+
+---
+
##### `UsernameInput`Optional
```csharp
@@ -12044,6 +12231,26 @@ public string Password { get; }
---
+##### `PrivateKey`Required
+
+```csharp
+public string PrivateKey { get; }
+```
+
+- *Type:* string
+
+---
+
+##### `SelfManaged`Required
+
+```csharp
+public object SelfManaged { get; }
+```
+
+- *Type:* object
+
+---
+
##### `ServiceAccountJson`Required
```csharp
@@ -12054,6 +12261,26 @@ public string ServiceAccountJson { get; }
---
+##### `TlsCa`Required
+
+```csharp
+public string TlsCa { get; }
+```
+
+- *Type:* string
+
+---
+
+##### `TlsCertificate`Required
+
+```csharp
+public string TlsCertificate { get; }
+```
+
+- *Type:* string
+
+---
+
##### `Username`Required
```csharp
diff --git a/docs/databaseSecretBackendConnection.go.md b/docs/databaseSecretBackendConnection.go.md
index 439f3e79..28649a9e 100644
--- a/docs/databaseSecretBackendConnection.go.md
+++ b/docs/databaseSecretBackendConnection.go.md
@@ -4,7 +4,7 @@
### DatabaseSecretBackendConnection
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection vault_database_secret_backend_connection}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection vault_database_secret_backend_connection}.
#### Initializers
@@ -876,7 +876,7 @@ The construct id used in the generated config for the DatabaseSecretBackendConne
The id of the existing DatabaseSecretBackendConnection that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#import import section} in the documentation of this resource for the id to use
---
@@ -1681,6 +1681,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretbackend
PemJson: *string,
Port: *f64,
ProtocolVersion: *f64,
+ SkipVerification: interface{},
Tls: interface{},
Username: *string,
}
@@ -1698,6 +1699,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretbackend
| PemJson
| *string
| Specifies JSON containing a certificate and private key; |
| Port
| *f64
| The transport port to use to connect to Cassandra. |
| ProtocolVersion
| *f64
| The CQL protocol version to use. |
+| SkipVerification
| interface{}
| Skip permissions checks when a connection to Cassandra is first created. |
| Tls
| interface{}
| Whether to use TLS when connecting to Cassandra. |
| Username
| *string
| The username to use when authenticating with Cassandra. |
@@ -1713,7 +1715,7 @@ ConnectTimeout *f64
The number of seconds to use as a connection timeout.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connect_timeout DatabaseSecretBackendConnection#connect_timeout}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connect_timeout DatabaseSecretBackendConnection#connect_timeout}
---
@@ -1727,7 +1729,7 @@ Hosts *[]*string
Cassandra hosts to connect to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#hosts DatabaseSecretBackendConnection#hosts}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#hosts DatabaseSecretBackendConnection#hosts}
---
@@ -1741,7 +1743,7 @@ InsecureTls interface{}
Whether to skip verification of the server certificate when using TLS.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls}
---
@@ -1755,7 +1757,7 @@ Password *string
The password to use when authenticating with Cassandra.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
---
@@ -1771,7 +1773,7 @@ Concatenated PEM blocks containing a certificate and private key;
a certificate, private key, and issuing CA certificate; or just a CA certificate.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#pem_bundle DatabaseSecretBackendConnection#pem_bundle}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#pem_bundle DatabaseSecretBackendConnection#pem_bundle}
---
@@ -1787,7 +1789,7 @@ Specifies JSON containing a certificate and private key;
a certificate, private key, and issuing CA certificate; or just a CA certificate.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#pem_json DatabaseSecretBackendConnection#pem_json}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#pem_json DatabaseSecretBackendConnection#pem_json}
---
@@ -1801,7 +1803,7 @@ Port *f64
The transport port to use to connect to Cassandra.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port}
---
@@ -1815,7 +1817,23 @@ ProtocolVersion *f64
The CQL protocol version to use.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#protocol_version DatabaseSecretBackendConnection#protocol_version}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#protocol_version DatabaseSecretBackendConnection#protocol_version}
+
+---
+
+##### `SkipVerification`Optional
+
+```go
+SkipVerification interface{}
+```
+
+- *Type:* interface{}
+
+Skip permissions checks when a connection to Cassandra is first created.
+
+These checks ensure that Vault is able to create roles, but can be resource intensive in clusters with many roles.
+
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#skip_verification DatabaseSecretBackendConnection#skip_verification}
---
@@ -1829,7 +1847,7 @@ Tls interface{}
Whether to use TLS when connecting to Cassandra.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls}
---
@@ -1843,7 +1861,7 @@ Username *string
The username to use when authenticating with Cassandra.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
---
@@ -1911,7 +1929,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretbackend
| Data
| *map[string]*string
| A map of sensitive data to pass to the endpoint. Useful for templated connection strings. |
| Elasticsearch
| DatabaseSecretBackendConnectionElasticsearch
| elasticsearch block. |
| Hana
| DatabaseSecretBackendConnectionHana
| hana block. |
-| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#id DatabaseSecretBackendConnection#id}. |
+| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#id DatabaseSecretBackendConnection#id}. |
| Influxdb
| DatabaseSecretBackendConnectionInfluxdb
| influxdb block. |
| Mongodb
| DatabaseSecretBackendConnectionMongodb
| mongodb block. |
| Mongodbatlas
| DatabaseSecretBackendConnectionMongodbatlas
| mongodbatlas block. |
@@ -2013,7 +2031,7 @@ Backend *string
Unique name of the Vault mount to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#backend DatabaseSecretBackendConnection#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#backend DatabaseSecretBackendConnection#backend}
---
@@ -2027,7 +2045,7 @@ Name *string
Name of the database connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#name DatabaseSecretBackendConnection#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#name DatabaseSecretBackendConnection#name}
---
@@ -2041,7 +2059,7 @@ AllowedRoles *[]*string
A list of roles that are allowed to use this connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#allowed_roles DatabaseSecretBackendConnection#allowed_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#allowed_roles DatabaseSecretBackendConnection#allowed_roles}
---
@@ -2055,7 +2073,7 @@ Cassandra DatabaseSecretBackendConnectionCassandra
cassandra block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#cassandra DatabaseSecretBackendConnection#cassandra}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#cassandra DatabaseSecretBackendConnection#cassandra}
---
@@ -2069,7 +2087,7 @@ Couchbase DatabaseSecretBackendConnectionCouchbase
couchbase block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#couchbase DatabaseSecretBackendConnection#couchbase}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#couchbase DatabaseSecretBackendConnection#couchbase}
---
@@ -2083,7 +2101,7 @@ Data *map[string]*string
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#data DatabaseSecretBackendConnection#data}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#data DatabaseSecretBackendConnection#data}
---
@@ -2097,7 +2115,7 @@ Elasticsearch DatabaseSecretBackendConnectionElasticsearch
elasticsearch block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#elasticsearch DatabaseSecretBackendConnection#elasticsearch}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#elasticsearch DatabaseSecretBackendConnection#elasticsearch}
---
@@ -2111,7 +2129,7 @@ Hana DatabaseSecretBackendConnectionHana
hana block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#hana DatabaseSecretBackendConnection#hana}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#hana DatabaseSecretBackendConnection#hana}
---
@@ -2123,7 +2141,7 @@ Id *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#id DatabaseSecretBackendConnection#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#id DatabaseSecretBackendConnection#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -2140,7 +2158,7 @@ Influxdb DatabaseSecretBackendConnectionInfluxdb
influxdb block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#influxdb DatabaseSecretBackendConnection#influxdb}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#influxdb DatabaseSecretBackendConnection#influxdb}
---
@@ -2154,7 +2172,7 @@ Mongodb DatabaseSecretBackendConnectionMongodb
mongodb block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#mongodb DatabaseSecretBackendConnection#mongodb}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#mongodb DatabaseSecretBackendConnection#mongodb}
---
@@ -2168,7 +2186,7 @@ Mongodbatlas DatabaseSecretBackendConnectionMongodbatlas
mongodbatlas block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#mongodbatlas DatabaseSecretBackendConnection#mongodbatlas}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#mongodbatlas DatabaseSecretBackendConnection#mongodbatlas}
---
@@ -2182,7 +2200,7 @@ Mssql DatabaseSecretBackendConnectionMssql
mssql block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#mssql DatabaseSecretBackendConnection#mssql}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#mssql DatabaseSecretBackendConnection#mssql}
---
@@ -2196,7 +2214,7 @@ Mysql DatabaseSecretBackendConnectionMysql
mysql block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#mysql DatabaseSecretBackendConnection#mysql}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#mysql DatabaseSecretBackendConnection#mysql}
---
@@ -2210,7 +2228,7 @@ MysqlAurora DatabaseSecretBackendConnectionMysqlAurora
mysql_aurora block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#mysql_aurora DatabaseSecretBackendConnection#mysql_aurora}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#mysql_aurora DatabaseSecretBackendConnection#mysql_aurora}
---
@@ -2224,7 +2242,7 @@ MysqlLegacy DatabaseSecretBackendConnectionMysqlLegacy
mysql_legacy block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#mysql_legacy DatabaseSecretBackendConnection#mysql_legacy}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#mysql_legacy DatabaseSecretBackendConnection#mysql_legacy}
---
@@ -2238,7 +2256,7 @@ MysqlRds DatabaseSecretBackendConnectionMysqlRds
mysql_rds block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#mysql_rds DatabaseSecretBackendConnection#mysql_rds}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#mysql_rds DatabaseSecretBackendConnection#mysql_rds}
---
@@ -2252,7 +2270,7 @@ Namespace *string
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#namespace DatabaseSecretBackendConnection#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#namespace DatabaseSecretBackendConnection#namespace}
---
@@ -2266,7 +2284,7 @@ Oracle DatabaseSecretBackendConnectionOracle
oracle block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#oracle DatabaseSecretBackendConnection#oracle}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#oracle DatabaseSecretBackendConnection#oracle}
---
@@ -2282,7 +2300,7 @@ Specifies the name of the plugin to use for this connection.
Must be prefixed with the name of one of the supported database engine types.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#plugin_name DatabaseSecretBackendConnection#plugin_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#plugin_name DatabaseSecretBackendConnection#plugin_name}
---
@@ -2296,7 +2314,7 @@ Postgresql DatabaseSecretBackendConnectionPostgresql
postgresql block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#postgresql DatabaseSecretBackendConnection#postgresql}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#postgresql DatabaseSecretBackendConnection#postgresql}
---
@@ -2310,7 +2328,7 @@ Redis DatabaseSecretBackendConnectionRedis
redis block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#redis DatabaseSecretBackendConnection#redis}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#redis DatabaseSecretBackendConnection#redis}
---
@@ -2324,7 +2342,7 @@ RedisElasticache DatabaseSecretBackendConnectionRedisElasticache
redis_elasticache block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#redis_elasticache DatabaseSecretBackendConnection#redis_elasticache}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#redis_elasticache DatabaseSecretBackendConnection#redis_elasticache}
---
@@ -2338,7 +2356,7 @@ Redshift DatabaseSecretBackendConnectionRedshift
redshift block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#redshift DatabaseSecretBackendConnection#redshift}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#redshift DatabaseSecretBackendConnection#redshift}
---
@@ -2352,7 +2370,7 @@ RootRotationStatements *[]*string
A list of database statements to be executed to rotate the root user's credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#root_rotation_statements DatabaseSecretBackendConnection#root_rotation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#root_rotation_statements DatabaseSecretBackendConnection#root_rotation_statements}
---
@@ -2366,7 +2384,7 @@ Snowflake DatabaseSecretBackendConnectionSnowflake
snowflake block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#snowflake DatabaseSecretBackendConnection#snowflake}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#snowflake DatabaseSecretBackendConnection#snowflake}
---
@@ -2380,7 +2398,7 @@ VerifyConnection interface{}
Specifies if the connection is verified during initial configuration.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#verify_connection DatabaseSecretBackendConnection#verify_connection}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#verify_connection DatabaseSecretBackendConnection#verify_connection}
---
@@ -2428,7 +2446,7 @@ Hosts *[]*string
A set of Couchbase URIs to connect to. Must use `couchbases://` scheme if `tls` is `true`.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#hosts DatabaseSecretBackendConnection#hosts}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#hosts DatabaseSecretBackendConnection#hosts}
---
@@ -2442,7 +2460,7 @@ Password *string
Specifies the password corresponding to the given username.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
---
@@ -2456,7 +2474,7 @@ Username *string
Specifies the username for Vault to use.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
---
@@ -2472,7 +2490,7 @@ Required if `tls` is `true`.
Specifies the certificate authority of the Couchbase server, as a PEM certificate that has been base64 encoded.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#base64_pem DatabaseSecretBackendConnection#base64_pem}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#base64_pem DatabaseSecretBackendConnection#base64_pem}
---
@@ -2486,7 +2504,7 @@ BucketName *string
Required for Couchbase versions prior to 6.5.0. This is only used to verify vault's connection to the server.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#bucket_name DatabaseSecretBackendConnection#bucket_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#bucket_name DatabaseSecretBackendConnection#bucket_name}
---
@@ -2500,7 +2518,7 @@ InsecureTls interface{}
Specifies whether to skip verification of the server certificate when using TLS.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls}
---
@@ -2514,7 +2532,7 @@ Tls interface{}
Specifies whether to use TLS when connecting to Couchbase.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls}
---
@@ -2528,7 +2546,7 @@ UsernameTemplate *string
Template describing how dynamic usernames are generated.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
---
@@ -2580,7 +2598,7 @@ Password *string
The password to be used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
---
@@ -2594,7 +2612,7 @@ Url *string
The URL for Elasticsearch's API.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#url DatabaseSecretBackendConnection#url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#url DatabaseSecretBackendConnection#url}
---
@@ -2608,7 +2626,7 @@ Username *string
The username to be used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
---
@@ -2622,7 +2640,7 @@ CaCert *string
The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#ca_cert DatabaseSecretBackendConnection#ca_cert}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#ca_cert DatabaseSecretBackendConnection#ca_cert}
---
@@ -2636,7 +2654,7 @@ CaPath *string
The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#ca_path DatabaseSecretBackendConnection#ca_path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#ca_path DatabaseSecretBackendConnection#ca_path}
---
@@ -2650,7 +2668,7 @@ ClientCert *string
The path to the certificate for the Elasticsearch client to present for communication.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#client_cert DatabaseSecretBackendConnection#client_cert}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#client_cert DatabaseSecretBackendConnection#client_cert}
---
@@ -2664,7 +2682,7 @@ ClientKey *string
The path to the key for the Elasticsearch client to use for communication.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#client_key DatabaseSecretBackendConnection#client_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#client_key DatabaseSecretBackendConnection#client_key}
---
@@ -2678,7 +2696,7 @@ Insecure interface{}
Whether to disable certificate verification.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#insecure DatabaseSecretBackendConnection#insecure}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#insecure DatabaseSecretBackendConnection#insecure}
---
@@ -2692,7 +2710,7 @@ TlsServerName *string
This, if set, is used to set the SNI host when connecting via TLS.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_server_name DatabaseSecretBackendConnection#tls_server_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_server_name DatabaseSecretBackendConnection#tls_server_name}
---
@@ -2706,7 +2724,7 @@ UsernameTemplate *string
Template describing how dynamic usernames are generated.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
---
@@ -2752,7 +2770,7 @@ ConnectionUrl *string
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
---
@@ -2766,7 +2784,7 @@ DisableEscaping interface{}
Disable special character escaping in username and password.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping}
---
@@ -2780,7 +2798,7 @@ MaxConnectionLifetime *f64
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
---
@@ -2794,7 +2812,7 @@ MaxIdleConnections *f64
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
---
@@ -2808,7 +2826,7 @@ MaxOpenConnections *f64
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
---
@@ -2822,7 +2840,7 @@ Password *string
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
---
@@ -2836,7 +2854,7 @@ Username *string
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
---
@@ -2888,7 +2906,7 @@ Host *string
Influxdb host to connect to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#host DatabaseSecretBackendConnection#host}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#host DatabaseSecretBackendConnection#host}
---
@@ -2902,7 +2920,7 @@ Password *string
Specifies the password corresponding to the given username.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
---
@@ -2916,7 +2934,7 @@ Username *string
Specifies the username to use for superuser access.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
---
@@ -2930,7 +2948,7 @@ ConnectTimeout *f64
The number of seconds to use as a connection timeout.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connect_timeout DatabaseSecretBackendConnection#connect_timeout}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connect_timeout DatabaseSecretBackendConnection#connect_timeout}
---
@@ -2944,7 +2962,7 @@ InsecureTls interface{}
Whether to skip verification of the server certificate when using TLS.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls}
---
@@ -2960,7 +2978,7 @@ Concatenated PEM blocks containing a certificate and private key;
a certificate, private key, and issuing CA certificate; or just a CA certificate.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#pem_bundle DatabaseSecretBackendConnection#pem_bundle}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#pem_bundle DatabaseSecretBackendConnection#pem_bundle}
---
@@ -2976,7 +2994,7 @@ Specifies JSON containing a certificate and private key;
a certificate, private key, and issuing CA certificate; or just a CA certificate.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#pem_json DatabaseSecretBackendConnection#pem_json}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#pem_json DatabaseSecretBackendConnection#pem_json}
---
@@ -2990,7 +3008,7 @@ Port *f64
The transport port to use to connect to Influxdb.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port}
---
@@ -3004,7 +3022,7 @@ Tls interface{}
Whether to use TLS when connecting to Influxdb.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls}
---
@@ -3018,7 +3036,7 @@ UsernameTemplate *string
Template describing how dynamic usernames are generated.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
---
@@ -3064,7 +3082,7 @@ ConnectionUrl *string
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
---
@@ -3078,7 +3096,7 @@ MaxConnectionLifetime *f64
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
---
@@ -3092,7 +3110,7 @@ MaxIdleConnections *f64
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
---
@@ -3106,7 +3124,7 @@ MaxOpenConnections *f64
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
---
@@ -3120,7 +3138,7 @@ Password *string
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
---
@@ -3134,7 +3152,7 @@ Username *string
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
---
@@ -3148,7 +3166,7 @@ UsernameTemplate *string
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
---
@@ -3186,7 +3204,7 @@ PrivateKey *string
The Private Programmatic API Key used to connect with MongoDB Atlas API.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#private_key DatabaseSecretBackendConnection#private_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#private_key DatabaseSecretBackendConnection#private_key}
---
@@ -3200,7 +3218,7 @@ ProjectId *string
The Project ID the Database User should be created within.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#project_id DatabaseSecretBackendConnection#project_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#project_id DatabaseSecretBackendConnection#project_id}
---
@@ -3214,7 +3232,7 @@ PublicKey *string
The Public Programmatic API Key used to authenticate with the MongoDB Atlas API.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#public_key DatabaseSecretBackendConnection#public_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#public_key DatabaseSecretBackendConnection#public_key}
---
@@ -3264,7 +3282,7 @@ ConnectionUrl *string
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
---
@@ -3278,7 +3296,7 @@ ContainedDb interface{}
Set to true when the target is a Contained Database, e.g. AzureSQL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#contained_db DatabaseSecretBackendConnection#contained_db}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#contained_db DatabaseSecretBackendConnection#contained_db}
---
@@ -3292,7 +3310,7 @@ DisableEscaping interface{}
Disable special character escaping in username and password.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping}
---
@@ -3306,7 +3324,7 @@ MaxConnectionLifetime *f64
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
---
@@ -3320,7 +3338,7 @@ MaxIdleConnections *f64
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
---
@@ -3334,7 +3352,7 @@ MaxOpenConnections *f64
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
---
@@ -3348,7 +3366,7 @@ Password *string
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
---
@@ -3362,7 +3380,7 @@ Username *string
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
---
@@ -3376,7 +3394,7 @@ UsernameTemplate *string
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
---
@@ -3430,7 +3448,7 @@ AuthType *string
Specify alternative authorization type. (Only 'gcp_iam' is valid currently).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type}
---
@@ -3444,7 +3462,7 @@ ConnectionUrl *string
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
---
@@ -3458,7 +3476,7 @@ MaxConnectionLifetime *f64
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
---
@@ -3472,7 +3490,7 @@ MaxIdleConnections *f64
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
---
@@ -3486,7 +3504,7 @@ MaxOpenConnections *f64
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
---
@@ -3500,7 +3518,7 @@ Password *string
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
---
@@ -3514,7 +3532,7 @@ ServiceAccountJson *string
A JSON encoded credential for use with IAM authorization.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json}
---
@@ -3528,7 +3546,7 @@ TlsCa *string
x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca}
---
@@ -3544,7 +3562,7 @@ x509 certificate for connecting to the database.
This must be a PEM encoded version of the private key and the certificate combined.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key}
---
@@ -3558,7 +3576,7 @@ Username *string
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
---
@@ -3572,7 +3590,7 @@ UsernameTemplate *string
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
---
@@ -3626,7 +3644,7 @@ AuthType *string
Specify alternative authorization type. (Only 'gcp_iam' is valid currently).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type}
---
@@ -3640,7 +3658,7 @@ ConnectionUrl *string
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
---
@@ -3654,7 +3672,7 @@ MaxConnectionLifetime *f64
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
---
@@ -3668,7 +3686,7 @@ MaxIdleConnections *f64
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
---
@@ -3682,7 +3700,7 @@ MaxOpenConnections *f64
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
---
@@ -3696,7 +3714,7 @@ Password *string
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
---
@@ -3710,7 +3728,7 @@ ServiceAccountJson *string
A JSON encoded credential for use with IAM authorization.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json}
---
@@ -3724,7 +3742,7 @@ TlsCa *string
x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca}
---
@@ -3740,7 +3758,7 @@ x509 certificate for connecting to the database.
This must be a PEM encoded version of the private key and the certificate combined.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key}
---
@@ -3754,7 +3772,7 @@ Username *string
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
---
@@ -3768,7 +3786,7 @@ UsernameTemplate *string
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
---
@@ -3822,7 +3840,7 @@ AuthType *string
Specify alternative authorization type. (Only 'gcp_iam' is valid currently).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type}
---
@@ -3836,7 +3854,7 @@ ConnectionUrl *string
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
---
@@ -3850,7 +3868,7 @@ MaxConnectionLifetime *f64
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
---
@@ -3864,7 +3882,7 @@ MaxIdleConnections *f64
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
---
@@ -3878,7 +3896,7 @@ MaxOpenConnections *f64
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
---
@@ -3892,7 +3910,7 @@ Password *string
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
---
@@ -3906,7 +3924,7 @@ ServiceAccountJson *string
A JSON encoded credential for use with IAM authorization.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json}
---
@@ -3920,7 +3938,7 @@ TlsCa *string
x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca}
---
@@ -3936,7 +3954,7 @@ x509 certificate for connecting to the database.
This must be a PEM encoded version of the private key and the certificate combined.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key}
---
@@ -3950,7 +3968,7 @@ Username *string
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
---
@@ -3964,7 +3982,7 @@ UsernameTemplate *string
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
---
@@ -4018,7 +4036,7 @@ AuthType *string
Specify alternative authorization type. (Only 'gcp_iam' is valid currently).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type}
---
@@ -4032,7 +4050,7 @@ ConnectionUrl *string
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
---
@@ -4046,7 +4064,7 @@ MaxConnectionLifetime *f64
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
---
@@ -4060,7 +4078,7 @@ MaxIdleConnections *f64
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
---
@@ -4074,7 +4092,7 @@ MaxOpenConnections *f64
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
---
@@ -4088,7 +4106,7 @@ Password *string
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
---
@@ -4102,7 +4120,7 @@ ServiceAccountJson *string
A JSON encoded credential for use with IAM authorization.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json}
---
@@ -4116,7 +4134,7 @@ TlsCa *string
x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca}
---
@@ -4132,7 +4150,7 @@ x509 certificate for connecting to the database.
This must be a PEM encoded version of the private key and the certificate combined.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key}
---
@@ -4146,7 +4164,7 @@ Username *string
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
---
@@ -4160,7 +4178,7 @@ UsernameTemplate *string
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
---
@@ -4210,7 +4228,7 @@ ConnectionUrl *string
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
---
@@ -4224,7 +4242,7 @@ DisconnectSessions interface{}
Set to true to disconnect any open sessions prior to running the revocation statements.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#disconnect_sessions DatabaseSecretBackendConnection#disconnect_sessions}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#disconnect_sessions DatabaseSecretBackendConnection#disconnect_sessions}
---
@@ -4238,7 +4256,7 @@ MaxConnectionLifetime *f64
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
---
@@ -4252,7 +4270,7 @@ MaxIdleConnections *f64
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
---
@@ -4266,7 +4284,7 @@ MaxOpenConnections *f64
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
---
@@ -4280,7 +4298,7 @@ Password *string
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
---
@@ -4294,7 +4312,7 @@ SplitStatements interface{}
Set to true in order to split statements after semi-colons.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#split_statements DatabaseSecretBackendConnection#split_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#split_statements DatabaseSecretBackendConnection#split_statements}
---
@@ -4308,7 +4326,7 @@ Username *string
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
---
@@ -4322,7 +4340,7 @@ UsernameTemplate *string
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
---
@@ -4341,7 +4359,11 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretbackend
MaxIdleConnections: *f64,
MaxOpenConnections: *f64,
Password: *string,
+ PrivateKey: *string,
+ SelfManaged: interface{},
ServiceAccountJson: *string,
+ TlsCa: *string,
+ TlsCertificate: *string,
Username: *string,
UsernameTemplate: *string,
}
@@ -4358,7 +4380,11 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretbackend
| MaxIdleConnections
| *f64
| Maximum number of idle connections to the database. |
| MaxOpenConnections
| *f64
| Maximum number of open connections to the database. |
| Password
| *string
| The root credential password used in the connection URL. |
+| PrivateKey
| *string
| The secret key used for the x509 client certificate. Must be PEM encoded. |
+| SelfManaged
| interface{}
| If set, allows onboarding static roles with a rootless connection configuration. |
| ServiceAccountJson
| *string
| A JSON encoded credential for use with IAM authorization. |
+| TlsCa
| *string
| The x509 CA file for validating the certificate presented by the PostgreSQL server. Must be PEM encoded. |
+| TlsCertificate
| *string
| The x509 client certificate for connecting to the database. Must be PEM encoded. |
| Username
| *string
| The root credential username used in the connection URL. |
| UsernameTemplate
| *string
| Username generation template. |
@@ -4374,7 +4400,7 @@ AuthType *string
Specify alternative authorization type. (Only 'gcp_iam' is valid currently).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type}
---
@@ -4388,7 +4414,7 @@ ConnectionUrl *string
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
---
@@ -4402,7 +4428,7 @@ DisableEscaping interface{}
Disable special character escaping in username and password.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping}
---
@@ -4416,7 +4442,7 @@ MaxConnectionLifetime *f64
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
---
@@ -4430,7 +4456,7 @@ MaxIdleConnections *f64
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
---
@@ -4444,7 +4470,7 @@ MaxOpenConnections *f64
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
---
@@ -4458,7 +4484,35 @@ Password *string
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+
+---
+
+##### `PrivateKey`Optional
+
+```go
+PrivateKey *string
+```
+
+- *Type:* *string
+
+The secret key used for the x509 client certificate. Must be PEM encoded.
+
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#private_key DatabaseSecretBackendConnection#private_key}
+
+---
+
+##### `SelfManaged`Optional
+
+```go
+SelfManaged interface{}
+```
+
+- *Type:* interface{}
+
+If set, allows onboarding static roles with a rootless connection configuration.
+
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#self_managed DatabaseSecretBackendConnection#self_managed}
---
@@ -4472,7 +4526,35 @@ ServiceAccountJson *string
A JSON encoded credential for use with IAM authorization.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json}
+
+---
+
+##### `TlsCa`Optional
+
+```go
+TlsCa *string
+```
+
+- *Type:* *string
+
+The x509 CA file for validating the certificate presented by the PostgreSQL server. Must be PEM encoded.
+
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca}
+
+---
+
+##### `TlsCertificate`Optional
+
+```go
+TlsCertificate *string
+```
+
+- *Type:* *string
+
+The x509 client certificate for connecting to the database. Must be PEM encoded.
+
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_certificate DatabaseSecretBackendConnection#tls_certificate}
---
@@ -4486,7 +4568,7 @@ Username *string
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
---
@@ -4500,7 +4582,7 @@ UsernameTemplate *string
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
---
@@ -4546,7 +4628,7 @@ Host *string
Specifies the host to connect to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#host DatabaseSecretBackendConnection#host}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#host DatabaseSecretBackendConnection#host}
---
@@ -4560,7 +4642,7 @@ Password *string
Specifies the password corresponding to the given username.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
---
@@ -4574,7 +4656,7 @@ Username *string
Specifies the username for Vault to use.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
---
@@ -4588,7 +4670,7 @@ CaCert *string
The contents of a PEM-encoded CA cert file to use to verify the Redis server's identity.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#ca_cert DatabaseSecretBackendConnection#ca_cert}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#ca_cert DatabaseSecretBackendConnection#ca_cert}
---
@@ -4602,7 +4684,7 @@ InsecureTls interface{}
Specifies whether to skip verification of the server certificate when using TLS.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls}
---
@@ -4616,7 +4698,7 @@ Port *f64
The transport port to use to connect to Redis.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port}
---
@@ -4630,7 +4712,7 @@ Tls interface{}
Specifies whether to use TLS when connecting to Redis.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls}
---
@@ -4670,7 +4752,7 @@ Url *string
The configuration endpoint for the ElastiCache cluster to connect to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#url DatabaseSecretBackendConnection#url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#url DatabaseSecretBackendConnection#url}
---
@@ -4686,7 +4768,7 @@ The AWS secret key id to use to talk to ElastiCache.
If omitted the credentials chain provider is used instead.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
---
@@ -4702,7 +4784,7 @@ The AWS region where the ElastiCache cluster is hosted.
If omitted the plugin tries to infer the region from the environment.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#region DatabaseSecretBackendConnection#region}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#region DatabaseSecretBackendConnection#region}
---
@@ -4718,7 +4800,7 @@ The AWS access key id to use to talk to ElastiCache.
If omitted the credentials chain provider is used instead.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
---
@@ -4766,7 +4848,7 @@ ConnectionUrl *string
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
---
@@ -4780,7 +4862,7 @@ DisableEscaping interface{}
Disable special character escaping in username and password.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping}
---
@@ -4794,7 +4876,7 @@ MaxConnectionLifetime *f64
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
---
@@ -4808,7 +4890,7 @@ MaxIdleConnections *f64
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
---
@@ -4822,7 +4904,7 @@ MaxOpenConnections *f64
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
---
@@ -4836,7 +4918,7 @@ Password *string
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
---
@@ -4850,7 +4932,7 @@ Username *string
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
---
@@ -4864,7 +4946,7 @@ UsernameTemplate *string
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
---
@@ -4910,7 +4992,7 @@ ConnectionUrl *string
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
---
@@ -4924,7 +5006,7 @@ MaxConnectionLifetime *f64
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
---
@@ -4938,7 +5020,7 @@ MaxIdleConnections *f64
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
---
@@ -4952,7 +5034,7 @@ MaxOpenConnections *f64
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
---
@@ -4966,7 +5048,7 @@ Password *string
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
---
@@ -4980,7 +5062,7 @@ Username *string
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
---
@@ -4994,7 +5076,7 @@ UsernameTemplate *string
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
---
@@ -5058,6 +5140,7 @@ The attribute on the parent resource this class is referencing.
| ResetPemJson
| *No description.* |
| ResetPort
| *No description.* |
| ResetProtocolVersion
| *No description.* |
+| ResetSkipVerification
| *No description.* |
| ResetTls
| *No description.* |
| ResetUsername
| *No description.* |
@@ -5261,6 +5344,12 @@ func ResetPort()
func ResetProtocolVersion()
```
+##### `ResetSkipVerification`
+
+```go
+func ResetSkipVerification()
+```
+
##### `ResetTls`
```go
@@ -5288,6 +5377,7 @@ func ResetUsername()
| PemJsonInput
| *string
| *No description.* |
| PortInput
| *f64
| *No description.* |
| ProtocolVersionInput
| *f64
| *No description.* |
+| SkipVerificationInput
| interface{}
| *No description.* |
| TlsInput
| interface{}
| *No description.* |
| UsernameInput
| *string
| *No description.* |
| ConnectTimeout
| *f64
| *No description.* |
@@ -5298,6 +5388,7 @@ func ResetUsername()
| PemJson
| *string
| *No description.* |
| Port
| *f64
| *No description.* |
| ProtocolVersion
| *f64
| *No description.* |
+| SkipVerification
| interface{}
| *No description.* |
| Tls
| interface{}
| *No description.* |
| Username
| *string
| *No description.* |
| InternalValue
| DatabaseSecretBackendConnectionCassandra
| *No description.* |
@@ -5408,6 +5499,16 @@ func ProtocolVersionInput() *f64
---
+##### `SkipVerificationInput`Optional
+
+```go
+func SkipVerificationInput() interface{}
+```
+
+- *Type:* interface{}
+
+---
+
##### `TlsInput`Optional
```go
@@ -5508,6 +5609,16 @@ func ProtocolVersion() *f64
---
+##### `SkipVerification`Required
+
+```go
+func SkipVerification() interface{}
+```
+
+- *Type:* interface{}
+
+---
+
##### `Tls`Required
```go
@@ -11603,7 +11714,11 @@ The attribute on the parent resource this class is referencing.
| ResetMaxIdleConnections
| *No description.* |
| ResetMaxOpenConnections
| *No description.* |
| ResetPassword
| *No description.* |
+| ResetPrivateKey
| *No description.* |
+| ResetSelfManaged
| *No description.* |
| ResetServiceAccountJson
| *No description.* |
+| ResetTlsCa
| *No description.* |
+| ResetTlsCertificate
| *No description.* |
| ResetUsername
| *No description.* |
| ResetUsernameTemplate
| *No description.* |
@@ -11801,12 +11916,36 @@ func ResetMaxOpenConnections()
func ResetPassword()
```
+##### `ResetPrivateKey`
+
+```go
+func ResetPrivateKey()
+```
+
+##### `ResetSelfManaged`
+
+```go
+func ResetSelfManaged()
+```
+
##### `ResetServiceAccountJson`
```go
func ResetServiceAccountJson()
```
+##### `ResetTlsCa`
+
+```go
+func ResetTlsCa()
+```
+
+##### `ResetTlsCertificate`
+
+```go
+func ResetTlsCertificate()
+```
+
##### `ResetUsername`
```go
@@ -11833,7 +11972,11 @@ func ResetUsernameTemplate()
| MaxIdleConnectionsInput
| *f64
| *No description.* |
| MaxOpenConnectionsInput
| *f64
| *No description.* |
| PasswordInput
| *string
| *No description.* |
+| PrivateKeyInput
| *string
| *No description.* |
+| SelfManagedInput
| interface{}
| *No description.* |
| ServiceAccountJsonInput
| *string
| *No description.* |
+| TlsCaInput
| *string
| *No description.* |
+| TlsCertificateInput
| *string
| *No description.* |
| UsernameInput
| *string
| *No description.* |
| UsernameTemplateInput
| *string
| *No description.* |
| AuthType
| *string
| *No description.* |
@@ -11843,7 +11986,11 @@ func ResetUsernameTemplate()
| MaxIdleConnections
| *f64
| *No description.* |
| MaxOpenConnections
| *f64
| *No description.* |
| Password
| *string
| *No description.* |
+| PrivateKey
| *string
| *No description.* |
+| SelfManaged
| interface{}
| *No description.* |
| ServiceAccountJson
| *string
| *No description.* |
+| TlsCa
| *string
| *No description.* |
+| TlsCertificate
| *string
| *No description.* |
| Username
| *string
| *No description.* |
| UsernameTemplate
| *string
| *No description.* |
| InternalValue
| DatabaseSecretBackendConnectionPostgresql
| *No description.* |
@@ -11944,6 +12091,26 @@ func PasswordInput() *string
---
+##### `PrivateKeyInput`Optional
+
+```go
+func PrivateKeyInput() *string
+```
+
+- *Type:* *string
+
+---
+
+##### `SelfManagedInput`Optional
+
+```go
+func SelfManagedInput() interface{}
+```
+
+- *Type:* interface{}
+
+---
+
##### `ServiceAccountJsonInput`Optional
```go
@@ -11954,6 +12121,26 @@ func ServiceAccountJsonInput() *string
---
+##### `TlsCaInput`Optional
+
+```go
+func TlsCaInput() *string
+```
+
+- *Type:* *string
+
+---
+
+##### `TlsCertificateInput`Optional
+
+```go
+func TlsCertificateInput() *string
+```
+
+- *Type:* *string
+
+---
+
##### `UsernameInput`Optional
```go
@@ -12044,6 +12231,26 @@ func Password() *string
---
+##### `PrivateKey`Required
+
+```go
+func PrivateKey() *string
+```
+
+- *Type:* *string
+
+---
+
+##### `SelfManaged`Required
+
+```go
+func SelfManaged() interface{}
+```
+
+- *Type:* interface{}
+
+---
+
##### `ServiceAccountJson`Required
```go
@@ -12054,6 +12261,26 @@ func ServiceAccountJson() *string
---
+##### `TlsCa`Required
+
+```go
+func TlsCa() *string
+```
+
+- *Type:* *string
+
+---
+
+##### `TlsCertificate`Required
+
+```go
+func TlsCertificate() *string
+```
+
+- *Type:* *string
+
+---
+
##### `Username`Required
```go
diff --git a/docs/databaseSecretBackendConnection.java.md b/docs/databaseSecretBackendConnection.java.md
index 866642ea..a6b16702 100644
--- a/docs/databaseSecretBackendConnection.java.md
+++ b/docs/databaseSecretBackendConnection.java.md
@@ -4,7 +4,7 @@
### DatabaseSecretBackendConnection
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection vault_database_secret_backend_connection}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection vault_database_secret_backend_connection}.
#### Initializers
@@ -73,7 +73,7 @@ DatabaseSecretBackendConnection.Builder.create(Construct scope, java.lang.String
| data
| java.util.Map
| A map of sensitive data to pass to the endpoint. Useful for templated connection strings. |
| elasticsearch
| DatabaseSecretBackendConnectionElasticsearch
| elasticsearch block. |
| hana
| DatabaseSecretBackendConnectionHana
| hana block. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#id DatabaseSecretBackendConnection#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#id DatabaseSecretBackendConnection#id}. |
| influxdb
| DatabaseSecretBackendConnectionInfluxdb
| influxdb block. |
| mongodb
| DatabaseSecretBackendConnectionMongodb
| mongodb block. |
| mongodbatlas
| DatabaseSecretBackendConnectionMongodbatlas
| mongodbatlas block. |
@@ -161,7 +161,7 @@ Must be unique amongst siblings in the same scope
Unique name of the Vault mount to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#backend DatabaseSecretBackendConnection#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#backend DatabaseSecretBackendConnection#backend}
---
@@ -171,7 +171,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Name of the database connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#name DatabaseSecretBackendConnection#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#name DatabaseSecretBackendConnection#name}
---
@@ -181,7 +181,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
A list of roles that are allowed to use this connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#allowed_roles DatabaseSecretBackendConnection#allowed_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#allowed_roles DatabaseSecretBackendConnection#allowed_roles}
---
@@ -191,7 +191,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
cassandra block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#cassandra DatabaseSecretBackendConnection#cassandra}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#cassandra DatabaseSecretBackendConnection#cassandra}
---
@@ -201,7 +201,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
couchbase block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#couchbase DatabaseSecretBackendConnection#couchbase}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#couchbase DatabaseSecretBackendConnection#couchbase}
---
@@ -211,7 +211,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#data DatabaseSecretBackendConnection#data}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#data DatabaseSecretBackendConnection#data}
---
@@ -221,7 +221,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
elasticsearch block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#elasticsearch DatabaseSecretBackendConnection#elasticsearch}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#elasticsearch DatabaseSecretBackendConnection#elasticsearch}
---
@@ -231,7 +231,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
hana block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#hana DatabaseSecretBackendConnection#hana}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#hana DatabaseSecretBackendConnection#hana}
---
@@ -239,7 +239,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#id DatabaseSecretBackendConnection#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#id DatabaseSecretBackendConnection#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -252,7 +252,7 @@ If you experience problems setting this value it might not be settable. Please t
influxdb block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#influxdb DatabaseSecretBackendConnection#influxdb}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#influxdb DatabaseSecretBackendConnection#influxdb}
---
@@ -262,7 +262,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
mongodb block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#mongodb DatabaseSecretBackendConnection#mongodb}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#mongodb DatabaseSecretBackendConnection#mongodb}
---
@@ -272,7 +272,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
mongodbatlas block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#mongodbatlas DatabaseSecretBackendConnection#mongodbatlas}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#mongodbatlas DatabaseSecretBackendConnection#mongodbatlas}
---
@@ -282,7 +282,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
mssql block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#mssql DatabaseSecretBackendConnection#mssql}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#mssql DatabaseSecretBackendConnection#mssql}
---
@@ -292,7 +292,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
mysql block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#mysql DatabaseSecretBackendConnection#mysql}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#mysql DatabaseSecretBackendConnection#mysql}
---
@@ -302,7 +302,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
mysql_aurora block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#mysql_aurora DatabaseSecretBackendConnection#mysql_aurora}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#mysql_aurora DatabaseSecretBackendConnection#mysql_aurora}
---
@@ -312,7 +312,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
mysql_legacy block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#mysql_legacy DatabaseSecretBackendConnection#mysql_legacy}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#mysql_legacy DatabaseSecretBackendConnection#mysql_legacy}
---
@@ -322,7 +322,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
mysql_rds block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#mysql_rds DatabaseSecretBackendConnection#mysql_rds}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#mysql_rds DatabaseSecretBackendConnection#mysql_rds}
---
@@ -332,7 +332,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#namespace DatabaseSecretBackendConnection#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#namespace DatabaseSecretBackendConnection#namespace}
---
@@ -342,7 +342,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
oracle block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#oracle DatabaseSecretBackendConnection#oracle}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#oracle DatabaseSecretBackendConnection#oracle}
---
@@ -354,7 +354,7 @@ Specifies the name of the plugin to use for this connection.
Must be prefixed with the name of one of the supported database engine types.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#plugin_name DatabaseSecretBackendConnection#plugin_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#plugin_name DatabaseSecretBackendConnection#plugin_name}
---
@@ -364,7 +364,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
postgresql block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#postgresql DatabaseSecretBackendConnection#postgresql}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#postgresql DatabaseSecretBackendConnection#postgresql}
---
@@ -374,7 +374,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
redis block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#redis DatabaseSecretBackendConnection#redis}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#redis DatabaseSecretBackendConnection#redis}
---
@@ -384,7 +384,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
redis_elasticache block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#redis_elasticache DatabaseSecretBackendConnection#redis_elasticache}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#redis_elasticache DatabaseSecretBackendConnection#redis_elasticache}
---
@@ -394,7 +394,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
redshift block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#redshift DatabaseSecretBackendConnection#redshift}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#redshift DatabaseSecretBackendConnection#redshift}
---
@@ -404,7 +404,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
A list of database statements to be executed to rotate the root user's credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#root_rotation_statements DatabaseSecretBackendConnection#root_rotation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#root_rotation_statements DatabaseSecretBackendConnection#root_rotation_statements}
---
@@ -414,7 +414,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
snowflake block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#snowflake DatabaseSecretBackendConnection#snowflake}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#snowflake DatabaseSecretBackendConnection#snowflake}
---
@@ -424,7 +424,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Specifies if the connection is verified during initial configuration.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#verify_connection DatabaseSecretBackendConnection#verify_connection}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#verify_connection DatabaseSecretBackendConnection#verify_connection}
---
@@ -1260,7 +1260,7 @@ The construct id used in the generated config for the DatabaseSecretBackendConne
The id of the existing DatabaseSecretBackendConnection that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#import import section} in the documentation of this resource for the id to use
---
@@ -2066,6 +2066,8 @@ DatabaseSecretBackendConnectionCassandra.builder()
// .pemJson(java.lang.String)
// .port(java.lang.Number)
// .protocolVersion(java.lang.Number)
+// .skipVerification(java.lang.Boolean)
+// .skipVerification(IResolvable)
// .tls(java.lang.Boolean)
// .tls(IResolvable)
// .username(java.lang.String)
@@ -2084,6 +2086,7 @@ DatabaseSecretBackendConnectionCassandra.builder()
| pemJson
| java.lang.String
| Specifies JSON containing a certificate and private key; |
| port
| java.lang.Number
| The transport port to use to connect to Cassandra. |
| protocolVersion
| java.lang.Number
| The CQL protocol version to use. |
+| skipVerification
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| Skip permissions checks when a connection to Cassandra is first created. |
| tls
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| Whether to use TLS when connecting to Cassandra. |
| username
| java.lang.String
| The username to use when authenticating with Cassandra. |
@@ -2099,7 +2102,7 @@ public java.lang.Number getConnectTimeout();
The number of seconds to use as a connection timeout.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connect_timeout DatabaseSecretBackendConnection#connect_timeout}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connect_timeout DatabaseSecretBackendConnection#connect_timeout}
---
@@ -2113,7 +2116,7 @@ public java.util.List getHosts();
Cassandra hosts to connect to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#hosts DatabaseSecretBackendConnection#hosts}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#hosts DatabaseSecretBackendConnection#hosts}
---
@@ -2127,7 +2130,7 @@ public java.lang.Object getInsecureTls();
Whether to skip verification of the server certificate when using TLS.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls}
---
@@ -2141,7 +2144,7 @@ public java.lang.String getPassword();
The password to use when authenticating with Cassandra.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
---
@@ -2157,7 +2160,7 @@ Concatenated PEM blocks containing a certificate and private key;
a certificate, private key, and issuing CA certificate; or just a CA certificate.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#pem_bundle DatabaseSecretBackendConnection#pem_bundle}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#pem_bundle DatabaseSecretBackendConnection#pem_bundle}
---
@@ -2173,7 +2176,7 @@ Specifies JSON containing a certificate and private key;
a certificate, private key, and issuing CA certificate; or just a CA certificate.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#pem_json DatabaseSecretBackendConnection#pem_json}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#pem_json DatabaseSecretBackendConnection#pem_json}
---
@@ -2187,7 +2190,7 @@ public java.lang.Number getPort();
The transport port to use to connect to Cassandra.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port}
---
@@ -2201,7 +2204,23 @@ public java.lang.Number getProtocolVersion();
The CQL protocol version to use.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#protocol_version DatabaseSecretBackendConnection#protocol_version}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#protocol_version DatabaseSecretBackendConnection#protocol_version}
+
+---
+
+##### `skipVerification`Optional
+
+```java
+public java.lang.Object getSkipVerification();
+```
+
+- *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
+
+Skip permissions checks when a connection to Cassandra is first created.
+
+These checks ensure that Vault is able to create roles, but can be resource intensive in clusters with many roles.
+
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#skip_verification DatabaseSecretBackendConnection#skip_verification}
---
@@ -2215,7 +2234,7 @@ public java.lang.Object getTls();
Whether to use TLS when connecting to Cassandra.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls}
---
@@ -2229,7 +2248,7 @@ public java.lang.String getUsername();
The username to use when authenticating with Cassandra.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
---
@@ -2302,7 +2321,7 @@ DatabaseSecretBackendConnectionConfig.builder()
| data
| java.util.Map
| A map of sensitive data to pass to the endpoint. Useful for templated connection strings. |
| elasticsearch
| DatabaseSecretBackendConnectionElasticsearch
| elasticsearch block. |
| hana
| DatabaseSecretBackendConnectionHana
| hana block. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#id DatabaseSecretBackendConnection#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#id DatabaseSecretBackendConnection#id}. |
| influxdb
| DatabaseSecretBackendConnectionInfluxdb
| influxdb block. |
| mongodb
| DatabaseSecretBackendConnectionMongodb
| mongodb block. |
| mongodbatlas
| DatabaseSecretBackendConnectionMongodbatlas
| mongodbatlas block. |
@@ -2404,7 +2423,7 @@ public java.lang.String getBackend();
Unique name of the Vault mount to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#backend DatabaseSecretBackendConnection#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#backend DatabaseSecretBackendConnection#backend}
---
@@ -2418,7 +2437,7 @@ public java.lang.String getName();
Name of the database connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#name DatabaseSecretBackendConnection#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#name DatabaseSecretBackendConnection#name}
---
@@ -2432,7 +2451,7 @@ public java.util.List getAllowedRoles();
A list of roles that are allowed to use this connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#allowed_roles DatabaseSecretBackendConnection#allowed_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#allowed_roles DatabaseSecretBackendConnection#allowed_roles}
---
@@ -2446,7 +2465,7 @@ public DatabaseSecretBackendConnectionCassandra getCassandra();
cassandra block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#cassandra DatabaseSecretBackendConnection#cassandra}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#cassandra DatabaseSecretBackendConnection#cassandra}
---
@@ -2460,7 +2479,7 @@ public DatabaseSecretBackendConnectionCouchbase getCouchbase();
couchbase block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#couchbase DatabaseSecretBackendConnection#couchbase}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#couchbase DatabaseSecretBackendConnection#couchbase}
---
@@ -2474,7 +2493,7 @@ public java.util.Map getData();
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#data DatabaseSecretBackendConnection#data}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#data DatabaseSecretBackendConnection#data}
---
@@ -2488,7 +2507,7 @@ public DatabaseSecretBackendConnectionElasticsearch getElasticsearch();
elasticsearch block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#elasticsearch DatabaseSecretBackendConnection#elasticsearch}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#elasticsearch DatabaseSecretBackendConnection#elasticsearch}
---
@@ -2502,7 +2521,7 @@ public DatabaseSecretBackendConnectionHana getHana();
hana block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#hana DatabaseSecretBackendConnection#hana}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#hana DatabaseSecretBackendConnection#hana}
---
@@ -2514,7 +2533,7 @@ public java.lang.String getId();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#id DatabaseSecretBackendConnection#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#id DatabaseSecretBackendConnection#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -2531,7 +2550,7 @@ public DatabaseSecretBackendConnectionInfluxdb getInfluxdb();
influxdb block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#influxdb DatabaseSecretBackendConnection#influxdb}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#influxdb DatabaseSecretBackendConnection#influxdb}
---
@@ -2545,7 +2564,7 @@ public DatabaseSecretBackendConnectionMongodb getMongodb();
mongodb block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#mongodb DatabaseSecretBackendConnection#mongodb}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#mongodb DatabaseSecretBackendConnection#mongodb}
---
@@ -2559,7 +2578,7 @@ public DatabaseSecretBackendConnectionMongodbatlas getMongodbatlas();
mongodbatlas block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#mongodbatlas DatabaseSecretBackendConnection#mongodbatlas}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#mongodbatlas DatabaseSecretBackendConnection#mongodbatlas}
---
@@ -2573,7 +2592,7 @@ public DatabaseSecretBackendConnectionMssql getMssql();
mssql block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#mssql DatabaseSecretBackendConnection#mssql}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#mssql DatabaseSecretBackendConnection#mssql}
---
@@ -2587,7 +2606,7 @@ public DatabaseSecretBackendConnectionMysql getMysql();
mysql block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#mysql DatabaseSecretBackendConnection#mysql}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#mysql DatabaseSecretBackendConnection#mysql}
---
@@ -2601,7 +2620,7 @@ public DatabaseSecretBackendConnectionMysqlAurora getMysqlAurora();
mysql_aurora block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#mysql_aurora DatabaseSecretBackendConnection#mysql_aurora}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#mysql_aurora DatabaseSecretBackendConnection#mysql_aurora}
---
@@ -2615,7 +2634,7 @@ public DatabaseSecretBackendConnectionMysqlLegacy getMysqlLegacy();
mysql_legacy block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#mysql_legacy DatabaseSecretBackendConnection#mysql_legacy}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#mysql_legacy DatabaseSecretBackendConnection#mysql_legacy}
---
@@ -2629,7 +2648,7 @@ public DatabaseSecretBackendConnectionMysqlRds getMysqlRds();
mysql_rds block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#mysql_rds DatabaseSecretBackendConnection#mysql_rds}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#mysql_rds DatabaseSecretBackendConnection#mysql_rds}
---
@@ -2643,7 +2662,7 @@ public java.lang.String getNamespace();
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#namespace DatabaseSecretBackendConnection#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#namespace DatabaseSecretBackendConnection#namespace}
---
@@ -2657,7 +2676,7 @@ public DatabaseSecretBackendConnectionOracle getOracle();
oracle block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#oracle DatabaseSecretBackendConnection#oracle}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#oracle DatabaseSecretBackendConnection#oracle}
---
@@ -2673,7 +2692,7 @@ Specifies the name of the plugin to use for this connection.
Must be prefixed with the name of one of the supported database engine types.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#plugin_name DatabaseSecretBackendConnection#plugin_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#plugin_name DatabaseSecretBackendConnection#plugin_name}
---
@@ -2687,7 +2706,7 @@ public DatabaseSecretBackendConnectionPostgresql getPostgresql();
postgresql block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#postgresql DatabaseSecretBackendConnection#postgresql}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#postgresql DatabaseSecretBackendConnection#postgresql}
---
@@ -2701,7 +2720,7 @@ public DatabaseSecretBackendConnectionRedis getRedis();
redis block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#redis DatabaseSecretBackendConnection#redis}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#redis DatabaseSecretBackendConnection#redis}
---
@@ -2715,7 +2734,7 @@ public DatabaseSecretBackendConnectionRedisElasticache getRedisElasticache();
redis_elasticache block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#redis_elasticache DatabaseSecretBackendConnection#redis_elasticache}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#redis_elasticache DatabaseSecretBackendConnection#redis_elasticache}
---
@@ -2729,7 +2748,7 @@ public DatabaseSecretBackendConnectionRedshift getRedshift();
redshift block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#redshift DatabaseSecretBackendConnection#redshift}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#redshift DatabaseSecretBackendConnection#redshift}
---
@@ -2743,7 +2762,7 @@ public java.util.List getRootRotationStatements();
A list of database statements to be executed to rotate the root user's credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#root_rotation_statements DatabaseSecretBackendConnection#root_rotation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#root_rotation_statements DatabaseSecretBackendConnection#root_rotation_statements}
---
@@ -2757,7 +2776,7 @@ public DatabaseSecretBackendConnectionSnowflake getSnowflake();
snowflake block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#snowflake DatabaseSecretBackendConnection#snowflake}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#snowflake DatabaseSecretBackendConnection#snowflake}
---
@@ -2771,7 +2790,7 @@ public java.lang.Object getVerifyConnection();
Specifies if the connection is verified during initial configuration.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#verify_connection DatabaseSecretBackendConnection#verify_connection}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#verify_connection DatabaseSecretBackendConnection#verify_connection}
---
@@ -2821,7 +2840,7 @@ public java.util.List getHosts();
A set of Couchbase URIs to connect to. Must use `couchbases://` scheme if `tls` is `true`.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#hosts DatabaseSecretBackendConnection#hosts}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#hosts DatabaseSecretBackendConnection#hosts}
---
@@ -2835,7 +2854,7 @@ public java.lang.String getPassword();
Specifies the password corresponding to the given username.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
---
@@ -2849,7 +2868,7 @@ public java.lang.String getUsername();
Specifies the username for Vault to use.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
---
@@ -2865,7 +2884,7 @@ Required if `tls` is `true`.
Specifies the certificate authority of the Couchbase server, as a PEM certificate that has been base64 encoded.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#base64_pem DatabaseSecretBackendConnection#base64_pem}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#base64_pem DatabaseSecretBackendConnection#base64_pem}
---
@@ -2879,7 +2898,7 @@ public java.lang.String getBucketName();
Required for Couchbase versions prior to 6.5.0. This is only used to verify vault's connection to the server.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#bucket_name DatabaseSecretBackendConnection#bucket_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#bucket_name DatabaseSecretBackendConnection#bucket_name}
---
@@ -2893,7 +2912,7 @@ public java.lang.Object getInsecureTls();
Specifies whether to skip verification of the server certificate when using TLS.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls}
---
@@ -2907,7 +2926,7 @@ public java.lang.Object getTls();
Specifies whether to use TLS when connecting to Couchbase.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls}
---
@@ -2921,7 +2940,7 @@ public java.lang.String getUsernameTemplate();
Template describing how dynamic usernames are generated.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
---
@@ -2974,7 +2993,7 @@ public java.lang.String getPassword();
The password to be used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
---
@@ -2988,7 +3007,7 @@ public java.lang.String getUrl();
The URL for Elasticsearch's API.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#url DatabaseSecretBackendConnection#url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#url DatabaseSecretBackendConnection#url}
---
@@ -3002,7 +3021,7 @@ public java.lang.String getUsername();
The username to be used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
---
@@ -3016,7 +3035,7 @@ public java.lang.String getCaCert();
The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#ca_cert DatabaseSecretBackendConnection#ca_cert}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#ca_cert DatabaseSecretBackendConnection#ca_cert}
---
@@ -3030,7 +3049,7 @@ public java.lang.String getCaPath();
The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#ca_path DatabaseSecretBackendConnection#ca_path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#ca_path DatabaseSecretBackendConnection#ca_path}
---
@@ -3044,7 +3063,7 @@ public java.lang.String getClientCert();
The path to the certificate for the Elasticsearch client to present for communication.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#client_cert DatabaseSecretBackendConnection#client_cert}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#client_cert DatabaseSecretBackendConnection#client_cert}
---
@@ -3058,7 +3077,7 @@ public java.lang.String getClientKey();
The path to the key for the Elasticsearch client to use for communication.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#client_key DatabaseSecretBackendConnection#client_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#client_key DatabaseSecretBackendConnection#client_key}
---
@@ -3072,7 +3091,7 @@ public java.lang.Object getInsecure();
Whether to disable certificate verification.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#insecure DatabaseSecretBackendConnection#insecure}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#insecure DatabaseSecretBackendConnection#insecure}
---
@@ -3086,7 +3105,7 @@ public java.lang.String getTlsServerName();
This, if set, is used to set the SNI host when connecting via TLS.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_server_name DatabaseSecretBackendConnection#tls_server_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_server_name DatabaseSecretBackendConnection#tls_server_name}
---
@@ -3100,7 +3119,7 @@ public java.lang.String getUsernameTemplate();
Template describing how dynamic usernames are generated.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
---
@@ -3147,7 +3166,7 @@ public java.lang.String getConnectionUrl();
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
---
@@ -3161,7 +3180,7 @@ public java.lang.Object getDisableEscaping();
Disable special character escaping in username and password.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping}
---
@@ -3175,7 +3194,7 @@ public java.lang.Number getMaxConnectionLifetime();
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
---
@@ -3189,7 +3208,7 @@ public java.lang.Number getMaxIdleConnections();
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
---
@@ -3203,7 +3222,7 @@ public java.lang.Number getMaxOpenConnections();
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
---
@@ -3217,7 +3236,7 @@ public java.lang.String getPassword();
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
---
@@ -3231,7 +3250,7 @@ public java.lang.String getUsername();
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
---
@@ -3285,7 +3304,7 @@ public java.lang.String getHost();
Influxdb host to connect to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#host DatabaseSecretBackendConnection#host}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#host DatabaseSecretBackendConnection#host}
---
@@ -3299,7 +3318,7 @@ public java.lang.String getPassword();
Specifies the password corresponding to the given username.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
---
@@ -3313,7 +3332,7 @@ public java.lang.String getUsername();
Specifies the username to use for superuser access.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
---
@@ -3327,7 +3346,7 @@ public java.lang.Number getConnectTimeout();
The number of seconds to use as a connection timeout.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connect_timeout DatabaseSecretBackendConnection#connect_timeout}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connect_timeout DatabaseSecretBackendConnection#connect_timeout}
---
@@ -3341,7 +3360,7 @@ public java.lang.Object getInsecureTls();
Whether to skip verification of the server certificate when using TLS.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls}
---
@@ -3357,7 +3376,7 @@ Concatenated PEM blocks containing a certificate and private key;
a certificate, private key, and issuing CA certificate; or just a CA certificate.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#pem_bundle DatabaseSecretBackendConnection#pem_bundle}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#pem_bundle DatabaseSecretBackendConnection#pem_bundle}
---
@@ -3373,7 +3392,7 @@ Specifies JSON containing a certificate and private key;
a certificate, private key, and issuing CA certificate; or just a CA certificate.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#pem_json DatabaseSecretBackendConnection#pem_json}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#pem_json DatabaseSecretBackendConnection#pem_json}
---
@@ -3387,7 +3406,7 @@ public java.lang.Number getPort();
The transport port to use to connect to Influxdb.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port}
---
@@ -3401,7 +3420,7 @@ public java.lang.Object getTls();
Whether to use TLS when connecting to Influxdb.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls}
---
@@ -3415,7 +3434,7 @@ public java.lang.String getUsernameTemplate();
Template describing how dynamic usernames are generated.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
---
@@ -3461,7 +3480,7 @@ public java.lang.String getConnectionUrl();
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
---
@@ -3475,7 +3494,7 @@ public java.lang.Number getMaxConnectionLifetime();
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
---
@@ -3489,7 +3508,7 @@ public java.lang.Number getMaxIdleConnections();
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
---
@@ -3503,7 +3522,7 @@ public java.lang.Number getMaxOpenConnections();
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
---
@@ -3517,7 +3536,7 @@ public java.lang.String getPassword();
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
---
@@ -3531,7 +3550,7 @@ public java.lang.String getUsername();
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
---
@@ -3545,7 +3564,7 @@ public java.lang.String getUsernameTemplate();
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
---
@@ -3583,7 +3602,7 @@ public java.lang.String getPrivateKey();
The Private Programmatic API Key used to connect with MongoDB Atlas API.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#private_key DatabaseSecretBackendConnection#private_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#private_key DatabaseSecretBackendConnection#private_key}
---
@@ -3597,7 +3616,7 @@ public java.lang.String getProjectId();
The Project ID the Database User should be created within.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#project_id DatabaseSecretBackendConnection#project_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#project_id DatabaseSecretBackendConnection#project_id}
---
@@ -3611,7 +3630,7 @@ public java.lang.String getPublicKey();
The Public Programmatic API Key used to authenticate with the MongoDB Atlas API.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#public_key DatabaseSecretBackendConnection#public_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#public_key DatabaseSecretBackendConnection#public_key}
---
@@ -3663,7 +3682,7 @@ public java.lang.String getConnectionUrl();
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
---
@@ -3677,7 +3696,7 @@ public java.lang.Object getContainedDb();
Set to true when the target is a Contained Database, e.g. AzureSQL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#contained_db DatabaseSecretBackendConnection#contained_db}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#contained_db DatabaseSecretBackendConnection#contained_db}
---
@@ -3691,7 +3710,7 @@ public java.lang.Object getDisableEscaping();
Disable special character escaping in username and password.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping}
---
@@ -3705,7 +3724,7 @@ public java.lang.Number getMaxConnectionLifetime();
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
---
@@ -3719,7 +3738,7 @@ public java.lang.Number getMaxIdleConnections();
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
---
@@ -3733,7 +3752,7 @@ public java.lang.Number getMaxOpenConnections();
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
---
@@ -3747,7 +3766,7 @@ public java.lang.String getPassword();
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
---
@@ -3761,7 +3780,7 @@ public java.lang.String getUsername();
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
---
@@ -3775,7 +3794,7 @@ public java.lang.String getUsernameTemplate();
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
---
@@ -3829,7 +3848,7 @@ public java.lang.String getAuthType();
Specify alternative authorization type. (Only 'gcp_iam' is valid currently).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type}
---
@@ -3843,7 +3862,7 @@ public java.lang.String getConnectionUrl();
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
---
@@ -3857,7 +3876,7 @@ public java.lang.Number getMaxConnectionLifetime();
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
---
@@ -3871,7 +3890,7 @@ public java.lang.Number getMaxIdleConnections();
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
---
@@ -3885,7 +3904,7 @@ public java.lang.Number getMaxOpenConnections();
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
---
@@ -3899,7 +3918,7 @@ public java.lang.String getPassword();
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
---
@@ -3913,7 +3932,7 @@ public java.lang.String getServiceAccountJson();
A JSON encoded credential for use with IAM authorization.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json}
---
@@ -3927,7 +3946,7 @@ public java.lang.String getTlsCa();
x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca}
---
@@ -3943,7 +3962,7 @@ x509 certificate for connecting to the database.
This must be a PEM encoded version of the private key and the certificate combined.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key}
---
@@ -3957,7 +3976,7 @@ public java.lang.String getUsername();
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
---
@@ -3971,7 +3990,7 @@ public java.lang.String getUsernameTemplate();
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
---
@@ -4025,7 +4044,7 @@ public java.lang.String getAuthType();
Specify alternative authorization type. (Only 'gcp_iam' is valid currently).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type}
---
@@ -4039,7 +4058,7 @@ public java.lang.String getConnectionUrl();
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
---
@@ -4053,7 +4072,7 @@ public java.lang.Number getMaxConnectionLifetime();
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
---
@@ -4067,7 +4086,7 @@ public java.lang.Number getMaxIdleConnections();
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
---
@@ -4081,7 +4100,7 @@ public java.lang.Number getMaxOpenConnections();
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
---
@@ -4095,7 +4114,7 @@ public java.lang.String getPassword();
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
---
@@ -4109,7 +4128,7 @@ public java.lang.String getServiceAccountJson();
A JSON encoded credential for use with IAM authorization.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json}
---
@@ -4123,7 +4142,7 @@ public java.lang.String getTlsCa();
x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca}
---
@@ -4139,7 +4158,7 @@ x509 certificate for connecting to the database.
This must be a PEM encoded version of the private key and the certificate combined.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key}
---
@@ -4153,7 +4172,7 @@ public java.lang.String getUsername();
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
---
@@ -4167,7 +4186,7 @@ public java.lang.String getUsernameTemplate();
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
---
@@ -4221,7 +4240,7 @@ public java.lang.String getAuthType();
Specify alternative authorization type. (Only 'gcp_iam' is valid currently).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type}
---
@@ -4235,7 +4254,7 @@ public java.lang.String getConnectionUrl();
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
---
@@ -4249,7 +4268,7 @@ public java.lang.Number getMaxConnectionLifetime();
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
---
@@ -4263,7 +4282,7 @@ public java.lang.Number getMaxIdleConnections();
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
---
@@ -4277,7 +4296,7 @@ public java.lang.Number getMaxOpenConnections();
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
---
@@ -4291,7 +4310,7 @@ public java.lang.String getPassword();
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
---
@@ -4305,7 +4324,7 @@ public java.lang.String getServiceAccountJson();
A JSON encoded credential for use with IAM authorization.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json}
---
@@ -4319,7 +4338,7 @@ public java.lang.String getTlsCa();
x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca}
---
@@ -4335,7 +4354,7 @@ x509 certificate for connecting to the database.
This must be a PEM encoded version of the private key and the certificate combined.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key}
---
@@ -4349,7 +4368,7 @@ public java.lang.String getUsername();
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
---
@@ -4363,7 +4382,7 @@ public java.lang.String getUsernameTemplate();
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
---
@@ -4417,7 +4436,7 @@ public java.lang.String getAuthType();
Specify alternative authorization type. (Only 'gcp_iam' is valid currently).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type}
---
@@ -4431,7 +4450,7 @@ public java.lang.String getConnectionUrl();
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
---
@@ -4445,7 +4464,7 @@ public java.lang.Number getMaxConnectionLifetime();
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
---
@@ -4459,7 +4478,7 @@ public java.lang.Number getMaxIdleConnections();
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
---
@@ -4473,7 +4492,7 @@ public java.lang.Number getMaxOpenConnections();
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
---
@@ -4487,7 +4506,7 @@ public java.lang.String getPassword();
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
---
@@ -4501,7 +4520,7 @@ public java.lang.String getServiceAccountJson();
A JSON encoded credential for use with IAM authorization.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json}
---
@@ -4515,7 +4534,7 @@ public java.lang.String getTlsCa();
x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca}
---
@@ -4531,7 +4550,7 @@ x509 certificate for connecting to the database.
This must be a PEM encoded version of the private key and the certificate combined.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key}
---
@@ -4545,7 +4564,7 @@ public java.lang.String getUsername();
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
---
@@ -4559,7 +4578,7 @@ public java.lang.String getUsernameTemplate();
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
---
@@ -4611,7 +4630,7 @@ public java.lang.String getConnectionUrl();
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
---
@@ -4625,7 +4644,7 @@ public java.lang.Object getDisconnectSessions();
Set to true to disconnect any open sessions prior to running the revocation statements.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#disconnect_sessions DatabaseSecretBackendConnection#disconnect_sessions}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#disconnect_sessions DatabaseSecretBackendConnection#disconnect_sessions}
---
@@ -4639,7 +4658,7 @@ public java.lang.Number getMaxConnectionLifetime();
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
---
@@ -4653,7 +4672,7 @@ public java.lang.Number getMaxIdleConnections();
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
---
@@ -4667,7 +4686,7 @@ public java.lang.Number getMaxOpenConnections();
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
---
@@ -4681,7 +4700,7 @@ public java.lang.String getPassword();
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
---
@@ -4695,7 +4714,7 @@ public java.lang.Object getSplitStatements();
Set to true in order to split statements after semi-colons.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#split_statements DatabaseSecretBackendConnection#split_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#split_statements DatabaseSecretBackendConnection#split_statements}
---
@@ -4709,7 +4728,7 @@ public java.lang.String getUsername();
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
---
@@ -4723,7 +4742,7 @@ public java.lang.String getUsernameTemplate();
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
---
@@ -4743,7 +4762,12 @@ DatabaseSecretBackendConnectionPostgresql.builder()
// .maxIdleConnections(java.lang.Number)
// .maxOpenConnections(java.lang.Number)
// .password(java.lang.String)
+// .privateKey(java.lang.String)
+// .selfManaged(java.lang.Boolean)
+// .selfManaged(IResolvable)
// .serviceAccountJson(java.lang.String)
+// .tlsCa(java.lang.String)
+// .tlsCertificate(java.lang.String)
// .username(java.lang.String)
// .usernameTemplate(java.lang.String)
.build();
@@ -4760,7 +4784,11 @@ DatabaseSecretBackendConnectionPostgresql.builder()
| maxIdleConnections
| java.lang.Number
| Maximum number of idle connections to the database. |
| maxOpenConnections
| java.lang.Number
| Maximum number of open connections to the database. |
| password
| java.lang.String
| The root credential password used in the connection URL. |
+| privateKey
| java.lang.String
| The secret key used for the x509 client certificate. Must be PEM encoded. |
+| selfManaged
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| If set, allows onboarding static roles with a rootless connection configuration. |
| serviceAccountJson
| java.lang.String
| A JSON encoded credential for use with IAM authorization. |
+| tlsCa
| java.lang.String
| The x509 CA file for validating the certificate presented by the PostgreSQL server. Must be PEM encoded. |
+| tlsCertificate
| java.lang.String
| The x509 client certificate for connecting to the database. Must be PEM encoded. |
| username
| java.lang.String
| The root credential username used in the connection URL. |
| usernameTemplate
| java.lang.String
| Username generation template. |
@@ -4776,7 +4804,7 @@ public java.lang.String getAuthType();
Specify alternative authorization type. (Only 'gcp_iam' is valid currently).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type}
---
@@ -4790,7 +4818,7 @@ public java.lang.String getConnectionUrl();
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
---
@@ -4804,7 +4832,7 @@ public java.lang.Object getDisableEscaping();
Disable special character escaping in username and password.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping}
---
@@ -4818,7 +4846,7 @@ public java.lang.Number getMaxConnectionLifetime();
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
---
@@ -4832,7 +4860,7 @@ public java.lang.Number getMaxIdleConnections();
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
---
@@ -4846,7 +4874,7 @@ public java.lang.Number getMaxOpenConnections();
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
---
@@ -4860,7 +4888,35 @@ public java.lang.String getPassword();
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+
+---
+
+##### `privateKey`Optional
+
+```java
+public java.lang.String getPrivateKey();
+```
+
+- *Type:* java.lang.String
+
+The secret key used for the x509 client certificate. Must be PEM encoded.
+
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#private_key DatabaseSecretBackendConnection#private_key}
+
+---
+
+##### `selfManaged`Optional
+
+```java
+public java.lang.Object getSelfManaged();
+```
+
+- *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
+
+If set, allows onboarding static roles with a rootless connection configuration.
+
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#self_managed DatabaseSecretBackendConnection#self_managed}
---
@@ -4874,7 +4930,35 @@ public java.lang.String getServiceAccountJson();
A JSON encoded credential for use with IAM authorization.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json}
+
+---
+
+##### `tlsCa`Optional
+
+```java
+public java.lang.String getTlsCa();
+```
+
+- *Type:* java.lang.String
+
+The x509 CA file for validating the certificate presented by the PostgreSQL server. Must be PEM encoded.
+
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca}
+
+---
+
+##### `tlsCertificate`Optional
+
+```java
+public java.lang.String getTlsCertificate();
+```
+
+- *Type:* java.lang.String
+
+The x509 client certificate for connecting to the database. Must be PEM encoded.
+
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_certificate DatabaseSecretBackendConnection#tls_certificate}
---
@@ -4888,7 +4972,7 @@ public java.lang.String getUsername();
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
---
@@ -4902,7 +4986,7 @@ public java.lang.String getUsernameTemplate();
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
---
@@ -4950,7 +5034,7 @@ public java.lang.String getHost();
Specifies the host to connect to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#host DatabaseSecretBackendConnection#host}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#host DatabaseSecretBackendConnection#host}
---
@@ -4964,7 +5048,7 @@ public java.lang.String getPassword();
Specifies the password corresponding to the given username.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
---
@@ -4978,7 +5062,7 @@ public java.lang.String getUsername();
Specifies the username for Vault to use.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
---
@@ -4992,7 +5076,7 @@ public java.lang.String getCaCert();
The contents of a PEM-encoded CA cert file to use to verify the Redis server's identity.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#ca_cert DatabaseSecretBackendConnection#ca_cert}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#ca_cert DatabaseSecretBackendConnection#ca_cert}
---
@@ -5006,7 +5090,7 @@ public java.lang.Object getInsecureTls();
Specifies whether to skip verification of the server certificate when using TLS.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls}
---
@@ -5020,7 +5104,7 @@ public java.lang.Number getPort();
The transport port to use to connect to Redis.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port}
---
@@ -5034,7 +5118,7 @@ public java.lang.Object getTls();
Specifies whether to use TLS when connecting to Redis.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls}
---
@@ -5074,7 +5158,7 @@ public java.lang.String getUrl();
The configuration endpoint for the ElastiCache cluster to connect to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#url DatabaseSecretBackendConnection#url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#url DatabaseSecretBackendConnection#url}
---
@@ -5090,7 +5174,7 @@ The AWS secret key id to use to talk to ElastiCache.
If omitted the credentials chain provider is used instead.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
---
@@ -5106,7 +5190,7 @@ The AWS region where the ElastiCache cluster is hosted.
If omitted the plugin tries to infer the region from the environment.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#region DatabaseSecretBackendConnection#region}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#region DatabaseSecretBackendConnection#region}
---
@@ -5122,7 +5206,7 @@ The AWS access key id to use to talk to ElastiCache.
If omitted the credentials chain provider is used instead.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
---
@@ -5171,7 +5255,7 @@ public java.lang.String getConnectionUrl();
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
---
@@ -5185,7 +5269,7 @@ public java.lang.Object getDisableEscaping();
Disable special character escaping in username and password.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping}
---
@@ -5199,7 +5283,7 @@ public java.lang.Number getMaxConnectionLifetime();
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
---
@@ -5213,7 +5297,7 @@ public java.lang.Number getMaxIdleConnections();
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
---
@@ -5227,7 +5311,7 @@ public java.lang.Number getMaxOpenConnections();
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
---
@@ -5241,7 +5325,7 @@ public java.lang.String getPassword();
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
---
@@ -5255,7 +5339,7 @@ public java.lang.String getUsername();
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
---
@@ -5269,7 +5353,7 @@ public java.lang.String getUsernameTemplate();
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
---
@@ -5315,7 +5399,7 @@ public java.lang.String getConnectionUrl();
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
---
@@ -5329,7 +5413,7 @@ public java.lang.Number getMaxConnectionLifetime();
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
---
@@ -5343,7 +5427,7 @@ public java.lang.Number getMaxIdleConnections();
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
---
@@ -5357,7 +5441,7 @@ public java.lang.Number getMaxOpenConnections();
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
---
@@ -5371,7 +5455,7 @@ public java.lang.String getPassword();
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
---
@@ -5385,7 +5469,7 @@ public java.lang.String getUsername();
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
---
@@ -5399,7 +5483,7 @@ public java.lang.String getUsernameTemplate();
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
---
@@ -5463,6 +5547,7 @@ The attribute on the parent resource this class is referencing.
| resetPemJson
| *No description.* |
| resetPort
| *No description.* |
| resetProtocolVersion
| *No description.* |
+| resetSkipVerification
| *No description.* |
| resetTls
| *No description.* |
| resetUsername
| *No description.* |
@@ -5666,6 +5751,12 @@ public void resetPort()
public void resetProtocolVersion()
```
+##### `resetSkipVerification`
+
+```java
+public void resetSkipVerification()
+```
+
##### `resetTls`
```java
@@ -5693,6 +5784,7 @@ public void resetUsername()
| pemJsonInput
| java.lang.String
| *No description.* |
| portInput
| java.lang.Number
| *No description.* |
| protocolVersionInput
| java.lang.Number
| *No description.* |
+| skipVerificationInput
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| *No description.* |
| tlsInput
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| *No description.* |
| usernameInput
| java.lang.String
| *No description.* |
| connectTimeout
| java.lang.Number
| *No description.* |
@@ -5703,6 +5795,7 @@ public void resetUsername()
| pemJson
| java.lang.String
| *No description.* |
| port
| java.lang.Number
| *No description.* |
| protocolVersion
| java.lang.Number
| *No description.* |
+| skipVerification
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| *No description.* |
| tls
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| *No description.* |
| username
| java.lang.String
| *No description.* |
| internalValue
| DatabaseSecretBackendConnectionCassandra
| *No description.* |
@@ -5813,6 +5906,16 @@ public java.lang.Number getProtocolVersionInput();
---
+##### `skipVerificationInput`Optional
+
+```java
+public java.lang.Object getSkipVerificationInput();
+```
+
+- *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
+
+---
+
##### `tlsInput`Optional
```java
@@ -5913,6 +6016,16 @@ public java.lang.Number getProtocolVersion();
---
+##### `skipVerification`Required
+
+```java
+public java.lang.Object getSkipVerification();
+```
+
+- *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
+
+---
+
##### `tls`Required
```java
@@ -12008,7 +12121,11 @@ The attribute on the parent resource this class is referencing.
| resetMaxIdleConnections
| *No description.* |
| resetMaxOpenConnections
| *No description.* |
| resetPassword
| *No description.* |
+| resetPrivateKey
| *No description.* |
+| resetSelfManaged
| *No description.* |
| resetServiceAccountJson
| *No description.* |
+| resetTlsCa
| *No description.* |
+| resetTlsCertificate
| *No description.* |
| resetUsername
| *No description.* |
| resetUsernameTemplate
| *No description.* |
@@ -12206,12 +12323,36 @@ public void resetMaxOpenConnections()
public void resetPassword()
```
+##### `resetPrivateKey`
+
+```java
+public void resetPrivateKey()
+```
+
+##### `resetSelfManaged`
+
+```java
+public void resetSelfManaged()
+```
+
##### `resetServiceAccountJson`
```java
public void resetServiceAccountJson()
```
+##### `resetTlsCa`
+
+```java
+public void resetTlsCa()
+```
+
+##### `resetTlsCertificate`
+
+```java
+public void resetTlsCertificate()
+```
+
##### `resetUsername`
```java
@@ -12238,7 +12379,11 @@ public void resetUsernameTemplate()
| maxIdleConnectionsInput
| java.lang.Number
| *No description.* |
| maxOpenConnectionsInput
| java.lang.Number
| *No description.* |
| passwordInput
| java.lang.String
| *No description.* |
+| privateKeyInput
| java.lang.String
| *No description.* |
+| selfManagedInput
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| *No description.* |
| serviceAccountJsonInput
| java.lang.String
| *No description.* |
+| tlsCaInput
| java.lang.String
| *No description.* |
+| tlsCertificateInput
| java.lang.String
| *No description.* |
| usernameInput
| java.lang.String
| *No description.* |
| usernameTemplateInput
| java.lang.String
| *No description.* |
| authType
| java.lang.String
| *No description.* |
@@ -12248,7 +12393,11 @@ public void resetUsernameTemplate()
| maxIdleConnections
| java.lang.Number
| *No description.* |
| maxOpenConnections
| java.lang.Number
| *No description.* |
| password
| java.lang.String
| *No description.* |
+| privateKey
| java.lang.String
| *No description.* |
+| selfManaged
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| *No description.* |
| serviceAccountJson
| java.lang.String
| *No description.* |
+| tlsCa
| java.lang.String
| *No description.* |
+| tlsCertificate
| java.lang.String
| *No description.* |
| username
| java.lang.String
| *No description.* |
| usernameTemplate
| java.lang.String
| *No description.* |
| internalValue
| DatabaseSecretBackendConnectionPostgresql
| *No description.* |
@@ -12349,6 +12498,26 @@ public java.lang.String getPasswordInput();
---
+##### `privateKeyInput`Optional
+
+```java
+public java.lang.String getPrivateKeyInput();
+```
+
+- *Type:* java.lang.String
+
+---
+
+##### `selfManagedInput`Optional
+
+```java
+public java.lang.Object getSelfManagedInput();
+```
+
+- *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
+
+---
+
##### `serviceAccountJsonInput`Optional
```java
@@ -12359,6 +12528,26 @@ public java.lang.String getServiceAccountJsonInput();
---
+##### `tlsCaInput`Optional
+
+```java
+public java.lang.String getTlsCaInput();
+```
+
+- *Type:* java.lang.String
+
+---
+
+##### `tlsCertificateInput`Optional
+
+```java
+public java.lang.String getTlsCertificateInput();
+```
+
+- *Type:* java.lang.String
+
+---
+
##### `usernameInput`Optional
```java
@@ -12449,6 +12638,26 @@ public java.lang.String getPassword();
---
+##### `privateKey`Required
+
+```java
+public java.lang.String getPrivateKey();
+```
+
+- *Type:* java.lang.String
+
+---
+
+##### `selfManaged`Required
+
+```java
+public java.lang.Object getSelfManaged();
+```
+
+- *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
+
+---
+
##### `serviceAccountJson`Required
```java
@@ -12459,6 +12668,26 @@ public java.lang.String getServiceAccountJson();
---
+##### `tlsCa`Required
+
+```java
+public java.lang.String getTlsCa();
+```
+
+- *Type:* java.lang.String
+
+---
+
+##### `tlsCertificate`Required
+
+```java
+public java.lang.String getTlsCertificate();
+```
+
+- *Type:* java.lang.String
+
+---
+
##### `username`Required
```java
diff --git a/docs/databaseSecretBackendConnection.python.md b/docs/databaseSecretBackendConnection.python.md
index bba6ae1f..f154b148 100644
--- a/docs/databaseSecretBackendConnection.python.md
+++ b/docs/databaseSecretBackendConnection.python.md
@@ -4,7 +4,7 @@
### DatabaseSecretBackendConnection
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection vault_database_secret_backend_connection}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection vault_database_secret_backend_connection}.
#### Initializers
@@ -70,7 +70,7 @@ databaseSecretBackendConnection.DatabaseSecretBackendConnection(
| data
| typing.Mapping[str]
| A map of sensitive data to pass to the endpoint. Useful for templated connection strings. |
| elasticsearch
| DatabaseSecretBackendConnectionElasticsearch
| elasticsearch block. |
| hana
| DatabaseSecretBackendConnectionHana
| hana block. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#id DatabaseSecretBackendConnection#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#id DatabaseSecretBackendConnection#id}. |
| influxdb
| DatabaseSecretBackendConnectionInfluxdb
| influxdb block. |
| mongodb
| DatabaseSecretBackendConnectionMongodb
| mongodb block. |
| mongodbatlas
| DatabaseSecretBackendConnectionMongodbatlas
| mongodbatlas block. |
@@ -158,7 +158,7 @@ Must be unique amongst siblings in the same scope
Unique name of the Vault mount to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#backend DatabaseSecretBackendConnection#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#backend DatabaseSecretBackendConnection#backend}
---
@@ -168,7 +168,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Name of the database connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#name DatabaseSecretBackendConnection#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#name DatabaseSecretBackendConnection#name}
---
@@ -178,7 +178,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
A list of roles that are allowed to use this connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#allowed_roles DatabaseSecretBackendConnection#allowed_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#allowed_roles DatabaseSecretBackendConnection#allowed_roles}
---
@@ -188,7 +188,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
cassandra block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#cassandra DatabaseSecretBackendConnection#cassandra}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#cassandra DatabaseSecretBackendConnection#cassandra}
---
@@ -198,7 +198,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
couchbase block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#couchbase DatabaseSecretBackendConnection#couchbase}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#couchbase DatabaseSecretBackendConnection#couchbase}
---
@@ -208,7 +208,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#data DatabaseSecretBackendConnection#data}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#data DatabaseSecretBackendConnection#data}
---
@@ -218,7 +218,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
elasticsearch block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#elasticsearch DatabaseSecretBackendConnection#elasticsearch}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#elasticsearch DatabaseSecretBackendConnection#elasticsearch}
---
@@ -228,7 +228,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
hana block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#hana DatabaseSecretBackendConnection#hana}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#hana DatabaseSecretBackendConnection#hana}
---
@@ -236,7 +236,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#id DatabaseSecretBackendConnection#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#id DatabaseSecretBackendConnection#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -249,7 +249,7 @@ If you experience problems setting this value it might not be settable. Please t
influxdb block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#influxdb DatabaseSecretBackendConnection#influxdb}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#influxdb DatabaseSecretBackendConnection#influxdb}
---
@@ -259,7 +259,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
mongodb block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#mongodb DatabaseSecretBackendConnection#mongodb}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#mongodb DatabaseSecretBackendConnection#mongodb}
---
@@ -269,7 +269,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
mongodbatlas block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#mongodbatlas DatabaseSecretBackendConnection#mongodbatlas}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#mongodbatlas DatabaseSecretBackendConnection#mongodbatlas}
---
@@ -279,7 +279,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
mssql block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#mssql DatabaseSecretBackendConnection#mssql}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#mssql DatabaseSecretBackendConnection#mssql}
---
@@ -289,7 +289,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
mysql block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#mysql DatabaseSecretBackendConnection#mysql}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#mysql DatabaseSecretBackendConnection#mysql}
---
@@ -299,7 +299,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
mysql_aurora block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#mysql_aurora DatabaseSecretBackendConnection#mysql_aurora}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#mysql_aurora DatabaseSecretBackendConnection#mysql_aurora}
---
@@ -309,7 +309,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
mysql_legacy block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#mysql_legacy DatabaseSecretBackendConnection#mysql_legacy}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#mysql_legacy DatabaseSecretBackendConnection#mysql_legacy}
---
@@ -319,7 +319,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
mysql_rds block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#mysql_rds DatabaseSecretBackendConnection#mysql_rds}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#mysql_rds DatabaseSecretBackendConnection#mysql_rds}
---
@@ -329,7 +329,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#namespace DatabaseSecretBackendConnection#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#namespace DatabaseSecretBackendConnection#namespace}
---
@@ -339,7 +339,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
oracle block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#oracle DatabaseSecretBackendConnection#oracle}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#oracle DatabaseSecretBackendConnection#oracle}
---
@@ -351,7 +351,7 @@ Specifies the name of the plugin to use for this connection.
Must be prefixed with the name of one of the supported database engine types.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#plugin_name DatabaseSecretBackendConnection#plugin_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#plugin_name DatabaseSecretBackendConnection#plugin_name}
---
@@ -361,7 +361,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
postgresql block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#postgresql DatabaseSecretBackendConnection#postgresql}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#postgresql DatabaseSecretBackendConnection#postgresql}
---
@@ -371,7 +371,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
redis block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#redis DatabaseSecretBackendConnection#redis}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#redis DatabaseSecretBackendConnection#redis}
---
@@ -381,7 +381,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
redis_elasticache block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#redis_elasticache DatabaseSecretBackendConnection#redis_elasticache}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#redis_elasticache DatabaseSecretBackendConnection#redis_elasticache}
---
@@ -391,7 +391,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
redshift block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#redshift DatabaseSecretBackendConnection#redshift}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#redshift DatabaseSecretBackendConnection#redshift}
---
@@ -401,7 +401,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
A list of database statements to be executed to rotate the root user's credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#root_rotation_statements DatabaseSecretBackendConnection#root_rotation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#root_rotation_statements DatabaseSecretBackendConnection#root_rotation_statements}
---
@@ -411,7 +411,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
snowflake block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#snowflake DatabaseSecretBackendConnection#snowflake}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#snowflake DatabaseSecretBackendConnection#snowflake}
---
@@ -421,7 +421,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Specifies if the connection is verified during initial configuration.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#verify_connection DatabaseSecretBackendConnection#verify_connection}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#verify_connection DatabaseSecretBackendConnection#verify_connection}
---
@@ -835,6 +835,7 @@ def put_cassandra(
pem_json: str = None,
port: typing.Union[int, float] = None,
protocol_version: typing.Union[int, float] = None,
+ skip_verification: typing.Union[bool, IResolvable] = None,
tls: typing.Union[bool, IResolvable] = None,
username: str = None
) -> None
@@ -846,7 +847,7 @@ def put_cassandra(
The number of seconds to use as a connection timeout.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connect_timeout DatabaseSecretBackendConnection#connect_timeout}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connect_timeout DatabaseSecretBackendConnection#connect_timeout}
---
@@ -856,7 +857,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Cassandra hosts to connect to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#hosts DatabaseSecretBackendConnection#hosts}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#hosts DatabaseSecretBackendConnection#hosts}
---
@@ -866,7 +867,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Whether to skip verification of the server certificate when using TLS.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls}
---
@@ -876,7 +877,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The password to use when authenticating with Cassandra.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
---
@@ -888,7 +889,7 @@ Concatenated PEM blocks containing a certificate and private key;
a certificate, private key, and issuing CA certificate; or just a CA certificate.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#pem_bundle DatabaseSecretBackendConnection#pem_bundle}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#pem_bundle DatabaseSecretBackendConnection#pem_bundle}
---
@@ -900,7 +901,7 @@ Specifies JSON containing a certificate and private key;
a certificate, private key, and issuing CA certificate; or just a CA certificate.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#pem_json DatabaseSecretBackendConnection#pem_json}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#pem_json DatabaseSecretBackendConnection#pem_json}
---
@@ -910,7 +911,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The transport port to use to connect to Cassandra.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port}
---
@@ -920,7 +921,19 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The CQL protocol version to use.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#protocol_version DatabaseSecretBackendConnection#protocol_version}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#protocol_version DatabaseSecretBackendConnection#protocol_version}
+
+---
+
+###### `skip_verification`Optional
+
+- *Type:* typing.Union[bool, cdktf.IResolvable]
+
+Skip permissions checks when a connection to Cassandra is first created.
+
+These checks ensure that Vault is able to create roles, but can be resource intensive in clusters with many roles.
+
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#skip_verification DatabaseSecretBackendConnection#skip_verification}
---
@@ -930,7 +943,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Whether to use TLS when connecting to Cassandra.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls}
---
@@ -940,7 +953,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The username to use when authenticating with Cassandra.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
---
@@ -965,7 +978,7 @@ def put_couchbase(
A set of Couchbase URIs to connect to. Must use `couchbases://` scheme if `tls` is `true`.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#hosts DatabaseSecretBackendConnection#hosts}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#hosts DatabaseSecretBackendConnection#hosts}
---
@@ -975,7 +988,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Specifies the password corresponding to the given username.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
---
@@ -985,7 +998,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Specifies the username for Vault to use.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
---
@@ -997,7 +1010,7 @@ Required if `tls` is `true`.
Specifies the certificate authority of the Couchbase server, as a PEM certificate that has been base64 encoded.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#base64_pem DatabaseSecretBackendConnection#base64_pem}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#base64_pem DatabaseSecretBackendConnection#base64_pem}
---
@@ -1007,7 +1020,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Required for Couchbase versions prior to 6.5.0. This is only used to verify vault's connection to the server.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#bucket_name DatabaseSecretBackendConnection#bucket_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#bucket_name DatabaseSecretBackendConnection#bucket_name}
---
@@ -1017,7 +1030,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Specifies whether to skip verification of the server certificate when using TLS.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls}
---
@@ -1027,7 +1040,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Specifies whether to use TLS when connecting to Couchbase.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls}
---
@@ -1037,7 +1050,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Template describing how dynamic usernames are generated.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
---
@@ -1064,7 +1077,7 @@ def put_elasticsearch(
The password to be used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
---
@@ -1074,7 +1087,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The URL for Elasticsearch's API.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#url DatabaseSecretBackendConnection#url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#url DatabaseSecretBackendConnection#url}
---
@@ -1084,7 +1097,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The username to be used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
---
@@ -1094,7 +1107,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#ca_cert DatabaseSecretBackendConnection#ca_cert}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#ca_cert DatabaseSecretBackendConnection#ca_cert}
---
@@ -1104,7 +1117,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#ca_path DatabaseSecretBackendConnection#ca_path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#ca_path DatabaseSecretBackendConnection#ca_path}
---
@@ -1114,7 +1127,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The path to the certificate for the Elasticsearch client to present for communication.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#client_cert DatabaseSecretBackendConnection#client_cert}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#client_cert DatabaseSecretBackendConnection#client_cert}
---
@@ -1124,7 +1137,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The path to the key for the Elasticsearch client to use for communication.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#client_key DatabaseSecretBackendConnection#client_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#client_key DatabaseSecretBackendConnection#client_key}
---
@@ -1134,7 +1147,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Whether to disable certificate verification.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#insecure DatabaseSecretBackendConnection#insecure}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#insecure DatabaseSecretBackendConnection#insecure}
---
@@ -1144,7 +1157,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
This, if set, is used to set the SNI host when connecting via TLS.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_server_name DatabaseSecretBackendConnection#tls_server_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_server_name DatabaseSecretBackendConnection#tls_server_name}
---
@@ -1154,7 +1167,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Template describing how dynamic usernames are generated.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
---
@@ -1178,7 +1191,7 @@ def put_hana(
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
---
@@ -1188,7 +1201,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Disable special character escaping in username and password.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping}
---
@@ -1198,7 +1211,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
---
@@ -1208,7 +1221,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
---
@@ -1218,7 +1231,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
---
@@ -1228,7 +1241,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
---
@@ -1238,7 +1251,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
---
@@ -1265,7 +1278,7 @@ def put_influxdb(
Influxdb host to connect to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#host DatabaseSecretBackendConnection#host}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#host DatabaseSecretBackendConnection#host}
---
@@ -1275,7 +1288,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Specifies the password corresponding to the given username.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
---
@@ -1285,7 +1298,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Specifies the username to use for superuser access.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
---
@@ -1295,7 +1308,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The number of seconds to use as a connection timeout.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connect_timeout DatabaseSecretBackendConnection#connect_timeout}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connect_timeout DatabaseSecretBackendConnection#connect_timeout}
---
@@ -1305,7 +1318,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Whether to skip verification of the server certificate when using TLS.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls}
---
@@ -1317,7 +1330,7 @@ Concatenated PEM blocks containing a certificate and private key;
a certificate, private key, and issuing CA certificate; or just a CA certificate.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#pem_bundle DatabaseSecretBackendConnection#pem_bundle}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#pem_bundle DatabaseSecretBackendConnection#pem_bundle}
---
@@ -1329,7 +1342,7 @@ Specifies JSON containing a certificate and private key;
a certificate, private key, and issuing CA certificate; or just a CA certificate.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#pem_json DatabaseSecretBackendConnection#pem_json}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#pem_json DatabaseSecretBackendConnection#pem_json}
---
@@ -1339,7 +1352,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The transport port to use to connect to Influxdb.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port}
---
@@ -1349,7 +1362,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Whether to use TLS when connecting to Influxdb.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls}
---
@@ -1359,7 +1372,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Template describing how dynamic usernames are generated.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
---
@@ -1383,7 +1396,7 @@ def put_mongodb(
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
---
@@ -1393,7 +1406,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
---
@@ -1403,7 +1416,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
---
@@ -1413,7 +1426,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
---
@@ -1423,7 +1436,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
---
@@ -1433,7 +1446,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
---
@@ -1443,7 +1456,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
---
@@ -1463,7 +1476,7 @@ def put_mongodbatlas(
The Private Programmatic API Key used to connect with MongoDB Atlas API.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#private_key DatabaseSecretBackendConnection#private_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#private_key DatabaseSecretBackendConnection#private_key}
---
@@ -1473,7 +1486,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The Project ID the Database User should be created within.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#project_id DatabaseSecretBackendConnection#project_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#project_id DatabaseSecretBackendConnection#project_id}
---
@@ -1483,7 +1496,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The Public Programmatic API Key used to authenticate with the MongoDB Atlas API.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#public_key DatabaseSecretBackendConnection#public_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#public_key DatabaseSecretBackendConnection#public_key}
---
@@ -1509,7 +1522,7 @@ def put_mssql(
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
---
@@ -1519,7 +1532,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Set to true when the target is a Contained Database, e.g. AzureSQL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#contained_db DatabaseSecretBackendConnection#contained_db}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#contained_db DatabaseSecretBackendConnection#contained_db}
---
@@ -1529,7 +1542,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Disable special character escaping in username and password.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping}
---
@@ -1539,7 +1552,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
---
@@ -1549,7 +1562,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
---
@@ -1559,7 +1572,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
---
@@ -1569,7 +1582,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
---
@@ -1579,7 +1592,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
---
@@ -1589,7 +1602,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
---
@@ -1617,7 +1630,7 @@ def put_mysql(
Specify alternative authorization type. (Only 'gcp_iam' is valid currently).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type}
---
@@ -1627,7 +1640,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
---
@@ -1637,7 +1650,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
---
@@ -1647,7 +1660,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
---
@@ -1657,7 +1670,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
---
@@ -1667,7 +1680,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
---
@@ -1677,7 +1690,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
A JSON encoded credential for use with IAM authorization.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json}
---
@@ -1687,7 +1700,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca}
---
@@ -1699,7 +1712,7 @@ x509 certificate for connecting to the database.
This must be a PEM encoded version of the private key and the certificate combined.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key}
---
@@ -1709,7 +1722,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
---
@@ -1719,7 +1732,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
---
@@ -1747,7 +1760,7 @@ def put_mysql_aurora(
Specify alternative authorization type. (Only 'gcp_iam' is valid currently).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type}
---
@@ -1757,7 +1770,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
---
@@ -1767,7 +1780,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
---
@@ -1777,7 +1790,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
---
@@ -1787,7 +1800,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
---
@@ -1797,7 +1810,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
---
@@ -1807,7 +1820,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
A JSON encoded credential for use with IAM authorization.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json}
---
@@ -1817,7 +1830,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca}
---
@@ -1829,7 +1842,7 @@ x509 certificate for connecting to the database.
This must be a PEM encoded version of the private key and the certificate combined.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key}
---
@@ -1839,7 +1852,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
---
@@ -1849,7 +1862,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
---
@@ -1877,7 +1890,7 @@ def put_mysql_legacy(
Specify alternative authorization type. (Only 'gcp_iam' is valid currently).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type}
---
@@ -1887,7 +1900,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
---
@@ -1897,7 +1910,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
---
@@ -1907,7 +1920,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
---
@@ -1917,7 +1930,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
---
@@ -1927,7 +1940,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
---
@@ -1937,7 +1950,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
A JSON encoded credential for use with IAM authorization.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json}
---
@@ -1947,7 +1960,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca}
---
@@ -1959,7 +1972,7 @@ x509 certificate for connecting to the database.
This must be a PEM encoded version of the private key and the certificate combined.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key}
---
@@ -1969,7 +1982,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
---
@@ -1979,7 +1992,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
---
@@ -2007,7 +2020,7 @@ def put_mysql_rds(
Specify alternative authorization type. (Only 'gcp_iam' is valid currently).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type}
---
@@ -2017,7 +2030,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
---
@@ -2027,7 +2040,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
---
@@ -2037,7 +2050,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
---
@@ -2047,7 +2060,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
---
@@ -2057,7 +2070,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
---
@@ -2067,7 +2080,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
A JSON encoded credential for use with IAM authorization.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json}
---
@@ -2077,7 +2090,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca}
---
@@ -2089,7 +2102,7 @@ x509 certificate for connecting to the database.
This must be a PEM encoded version of the private key and the certificate combined.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key}
---
@@ -2099,7 +2112,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
---
@@ -2109,7 +2122,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
---
@@ -2135,7 +2148,7 @@ def put_oracle(
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
---
@@ -2145,7 +2158,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Set to true to disconnect any open sessions prior to running the revocation statements.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#disconnect_sessions DatabaseSecretBackendConnection#disconnect_sessions}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#disconnect_sessions DatabaseSecretBackendConnection#disconnect_sessions}
---
@@ -2155,7 +2168,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
---
@@ -2165,7 +2178,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
---
@@ -2175,7 +2188,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
---
@@ -2185,7 +2198,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
---
@@ -2195,7 +2208,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Set to true in order to split statements after semi-colons.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#split_statements DatabaseSecretBackendConnection#split_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#split_statements DatabaseSecretBackendConnection#split_statements}
---
@@ -2205,7 +2218,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
---
@@ -2215,7 +2228,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
---
@@ -2230,7 +2243,11 @@ def put_postgresql(
max_idle_connections: typing.Union[int, float] = None,
max_open_connections: typing.Union[int, float] = None,
password: str = None,
+ private_key: str = None,
+ self_managed: typing.Union[bool, IResolvable] = None,
service_account_json: str = None,
+ tls_ca: str = None,
+ tls_certificate: str = None,
username: str = None,
username_template: str = None
) -> None
@@ -2242,7 +2259,7 @@ def put_postgresql(
Specify alternative authorization type. (Only 'gcp_iam' is valid currently).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type}
---
@@ -2252,7 +2269,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
---
@@ -2262,7 +2279,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Disable special character escaping in username and password.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping}
---
@@ -2272,7 +2289,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
---
@@ -2282,7 +2299,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
---
@@ -2292,7 +2309,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
---
@@ -2302,7 +2319,27 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+
+---
+
+###### `private_key`Optional
+
+- *Type:* str
+
+The secret key used for the x509 client certificate. Must be PEM encoded.
+
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#private_key DatabaseSecretBackendConnection#private_key}
+
+---
+
+###### `self_managed`Optional
+
+- *Type:* typing.Union[bool, cdktf.IResolvable]
+
+If set, allows onboarding static roles with a rootless connection configuration.
+
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#self_managed DatabaseSecretBackendConnection#self_managed}
---
@@ -2312,7 +2349,27 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
A JSON encoded credential for use with IAM authorization.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json}
+
+---
+
+###### `tls_ca`Optional
+
+- *Type:* str
+
+The x509 CA file for validating the certificate presented by the PostgreSQL server. Must be PEM encoded.
+
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca}
+
+---
+
+###### `tls_certificate`Optional
+
+- *Type:* str
+
+The x509 client certificate for connecting to the database. Must be PEM encoded.
+
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_certificate DatabaseSecretBackendConnection#tls_certificate}
---
@@ -2322,7 +2379,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
---
@@ -2332,7 +2389,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
---
@@ -2356,7 +2413,7 @@ def put_redis(
Specifies the host to connect to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#host DatabaseSecretBackendConnection#host}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#host DatabaseSecretBackendConnection#host}
---
@@ -2366,7 +2423,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Specifies the password corresponding to the given username.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
---
@@ -2376,7 +2433,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Specifies the username for Vault to use.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
---
@@ -2386,7 +2443,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The contents of a PEM-encoded CA cert file to use to verify the Redis server's identity.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#ca_cert DatabaseSecretBackendConnection#ca_cert}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#ca_cert DatabaseSecretBackendConnection#ca_cert}
---
@@ -2396,7 +2453,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Specifies whether to skip verification of the server certificate when using TLS.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls}
---
@@ -2406,7 +2463,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The transport port to use to connect to Redis.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port}
---
@@ -2416,7 +2473,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Specifies whether to use TLS when connecting to Redis.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls}
---
@@ -2437,7 +2494,7 @@ def put_redis_elasticache(
The configuration endpoint for the ElastiCache cluster to connect to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#url DatabaseSecretBackendConnection#url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#url DatabaseSecretBackendConnection#url}
---
@@ -2449,7 +2506,7 @@ The AWS secret key id to use to talk to ElastiCache.
If omitted the credentials chain provider is used instead.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
---
@@ -2461,7 +2518,7 @@ The AWS region where the ElastiCache cluster is hosted.
If omitted the plugin tries to infer the region from the environment.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#region DatabaseSecretBackendConnection#region}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#region DatabaseSecretBackendConnection#region}
---
@@ -2473,7 +2530,7 @@ The AWS access key id to use to talk to ElastiCache.
If omitted the credentials chain provider is used instead.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
---
@@ -2498,7 +2555,7 @@ def put_redshift(
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
---
@@ -2508,7 +2565,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Disable special character escaping in username and password.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping}
---
@@ -2518,7 +2575,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
---
@@ -2528,7 +2585,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
---
@@ -2538,7 +2595,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
---
@@ -2548,7 +2605,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
---
@@ -2558,7 +2615,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
---
@@ -2568,7 +2625,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
---
@@ -2592,7 +2649,7 @@ def put_snowflake(
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
---
@@ -2602,7 +2659,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
---
@@ -2612,7 +2669,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
---
@@ -2622,7 +2679,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
---
@@ -2632,7 +2689,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
---
@@ -2642,7 +2699,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
---
@@ -2652,7 +2709,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
---
@@ -2920,7 +2977,7 @@ The construct id used in the generated config for the DatabaseSecretBackendConne
The id of the existing DatabaseSecretBackendConnection that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#import import section} in the documentation of this resource for the id to use
---
@@ -3725,6 +3782,7 @@ databaseSecretBackendConnection.DatabaseSecretBackendConnectionCassandra(
pem_json: str = None,
port: typing.Union[int, float] = None,
protocol_version: typing.Union[int, float] = None,
+ skip_verification: typing.Union[bool, IResolvable] = None,
tls: typing.Union[bool, IResolvable] = None,
username: str = None
)
@@ -3742,6 +3800,7 @@ databaseSecretBackendConnection.DatabaseSecretBackendConnectionCassandra(
| pem_json
| str
| Specifies JSON containing a certificate and private key; |
| port
| typing.Union[int, float]
| The transport port to use to connect to Cassandra. |
| protocol_version
| typing.Union[int, float]
| The CQL protocol version to use. |
+| skip_verification
| typing.Union[bool, cdktf.IResolvable]
| Skip permissions checks when a connection to Cassandra is first created. |
| tls
| typing.Union[bool, cdktf.IResolvable]
| Whether to use TLS when connecting to Cassandra. |
| username
| str
| The username to use when authenticating with Cassandra. |
@@ -3757,7 +3816,7 @@ connect_timeout: typing.Union[int, float]
The number of seconds to use as a connection timeout.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connect_timeout DatabaseSecretBackendConnection#connect_timeout}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connect_timeout DatabaseSecretBackendConnection#connect_timeout}
---
@@ -3771,7 +3830,7 @@ hosts: typing.List[str]
Cassandra hosts to connect to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#hosts DatabaseSecretBackendConnection#hosts}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#hosts DatabaseSecretBackendConnection#hosts}
---
@@ -3785,7 +3844,7 @@ insecure_tls: typing.Union[bool, IResolvable]
Whether to skip verification of the server certificate when using TLS.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls}
---
@@ -3799,7 +3858,7 @@ password: str
The password to use when authenticating with Cassandra.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
---
@@ -3815,7 +3874,7 @@ Concatenated PEM blocks containing a certificate and private key;
a certificate, private key, and issuing CA certificate; or just a CA certificate.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#pem_bundle DatabaseSecretBackendConnection#pem_bundle}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#pem_bundle DatabaseSecretBackendConnection#pem_bundle}
---
@@ -3831,7 +3890,7 @@ Specifies JSON containing a certificate and private key;
a certificate, private key, and issuing CA certificate; or just a CA certificate.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#pem_json DatabaseSecretBackendConnection#pem_json}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#pem_json DatabaseSecretBackendConnection#pem_json}
---
@@ -3845,7 +3904,7 @@ port: typing.Union[int, float]
The transport port to use to connect to Cassandra.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port}
---
@@ -3859,7 +3918,23 @@ protocol_version: typing.Union[int, float]
The CQL protocol version to use.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#protocol_version DatabaseSecretBackendConnection#protocol_version}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#protocol_version DatabaseSecretBackendConnection#protocol_version}
+
+---
+
+##### `skip_verification`Optional
+
+```python
+skip_verification: typing.Union[bool, IResolvable]
+```
+
+- *Type:* typing.Union[bool, cdktf.IResolvable]
+
+Skip permissions checks when a connection to Cassandra is first created.
+
+These checks ensure that Vault is able to create roles, but can be resource intensive in clusters with many roles.
+
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#skip_verification DatabaseSecretBackendConnection#skip_verification}
---
@@ -3873,7 +3948,7 @@ tls: typing.Union[bool, IResolvable]
Whether to use TLS when connecting to Cassandra.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls}
---
@@ -3887,7 +3962,7 @@ username: str
The username to use when authenticating with Cassandra.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
---
@@ -3955,7 +4030,7 @@ databaseSecretBackendConnection.DatabaseSecretBackendConnectionConfig(
| data
| typing.Mapping[str]
| A map of sensitive data to pass to the endpoint. Useful for templated connection strings. |
| elasticsearch
| DatabaseSecretBackendConnectionElasticsearch
| elasticsearch block. |
| hana
| DatabaseSecretBackendConnectionHana
| hana block. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#id DatabaseSecretBackendConnection#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#id DatabaseSecretBackendConnection#id}. |
| influxdb
| DatabaseSecretBackendConnectionInfluxdb
| influxdb block. |
| mongodb
| DatabaseSecretBackendConnectionMongodb
| mongodb block. |
| mongodbatlas
| DatabaseSecretBackendConnectionMongodbatlas
| mongodbatlas block. |
@@ -4057,7 +4132,7 @@ backend: str
Unique name of the Vault mount to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#backend DatabaseSecretBackendConnection#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#backend DatabaseSecretBackendConnection#backend}
---
@@ -4071,7 +4146,7 @@ name: str
Name of the database connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#name DatabaseSecretBackendConnection#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#name DatabaseSecretBackendConnection#name}
---
@@ -4085,7 +4160,7 @@ allowed_roles: typing.List[str]
A list of roles that are allowed to use this connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#allowed_roles DatabaseSecretBackendConnection#allowed_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#allowed_roles DatabaseSecretBackendConnection#allowed_roles}
---
@@ -4099,7 +4174,7 @@ cassandra: DatabaseSecretBackendConnectionCassandra
cassandra block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#cassandra DatabaseSecretBackendConnection#cassandra}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#cassandra DatabaseSecretBackendConnection#cassandra}
---
@@ -4113,7 +4188,7 @@ couchbase: DatabaseSecretBackendConnectionCouchbase
couchbase block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#couchbase DatabaseSecretBackendConnection#couchbase}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#couchbase DatabaseSecretBackendConnection#couchbase}
---
@@ -4127,7 +4202,7 @@ data: typing.Mapping[str]
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#data DatabaseSecretBackendConnection#data}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#data DatabaseSecretBackendConnection#data}
---
@@ -4141,7 +4216,7 @@ elasticsearch: DatabaseSecretBackendConnectionElasticsearch
elasticsearch block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#elasticsearch DatabaseSecretBackendConnection#elasticsearch}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#elasticsearch DatabaseSecretBackendConnection#elasticsearch}
---
@@ -4155,7 +4230,7 @@ hana: DatabaseSecretBackendConnectionHana
hana block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#hana DatabaseSecretBackendConnection#hana}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#hana DatabaseSecretBackendConnection#hana}
---
@@ -4167,7 +4242,7 @@ id: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#id DatabaseSecretBackendConnection#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#id DatabaseSecretBackendConnection#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -4184,7 +4259,7 @@ influxdb: DatabaseSecretBackendConnectionInfluxdb
influxdb block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#influxdb DatabaseSecretBackendConnection#influxdb}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#influxdb DatabaseSecretBackendConnection#influxdb}
---
@@ -4198,7 +4273,7 @@ mongodb: DatabaseSecretBackendConnectionMongodb
mongodb block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#mongodb DatabaseSecretBackendConnection#mongodb}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#mongodb DatabaseSecretBackendConnection#mongodb}
---
@@ -4212,7 +4287,7 @@ mongodbatlas: DatabaseSecretBackendConnectionMongodbatlas
mongodbatlas block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#mongodbatlas DatabaseSecretBackendConnection#mongodbatlas}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#mongodbatlas DatabaseSecretBackendConnection#mongodbatlas}
---
@@ -4226,7 +4301,7 @@ mssql: DatabaseSecretBackendConnectionMssql
mssql block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#mssql DatabaseSecretBackendConnection#mssql}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#mssql DatabaseSecretBackendConnection#mssql}
---
@@ -4240,7 +4315,7 @@ mysql: DatabaseSecretBackendConnectionMysql
mysql block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#mysql DatabaseSecretBackendConnection#mysql}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#mysql DatabaseSecretBackendConnection#mysql}
---
@@ -4254,7 +4329,7 @@ mysql_aurora: DatabaseSecretBackendConnectionMysqlAurora
mysql_aurora block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#mysql_aurora DatabaseSecretBackendConnection#mysql_aurora}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#mysql_aurora DatabaseSecretBackendConnection#mysql_aurora}
---
@@ -4268,7 +4343,7 @@ mysql_legacy: DatabaseSecretBackendConnectionMysqlLegacy
mysql_legacy block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#mysql_legacy DatabaseSecretBackendConnection#mysql_legacy}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#mysql_legacy DatabaseSecretBackendConnection#mysql_legacy}
---
@@ -4282,7 +4357,7 @@ mysql_rds: DatabaseSecretBackendConnectionMysqlRds
mysql_rds block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#mysql_rds DatabaseSecretBackendConnection#mysql_rds}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#mysql_rds DatabaseSecretBackendConnection#mysql_rds}
---
@@ -4296,7 +4371,7 @@ namespace: str
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#namespace DatabaseSecretBackendConnection#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#namespace DatabaseSecretBackendConnection#namespace}
---
@@ -4310,7 +4385,7 @@ oracle: DatabaseSecretBackendConnectionOracle
oracle block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#oracle DatabaseSecretBackendConnection#oracle}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#oracle DatabaseSecretBackendConnection#oracle}
---
@@ -4326,7 +4401,7 @@ Specifies the name of the plugin to use for this connection.
Must be prefixed with the name of one of the supported database engine types.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#plugin_name DatabaseSecretBackendConnection#plugin_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#plugin_name DatabaseSecretBackendConnection#plugin_name}
---
@@ -4340,7 +4415,7 @@ postgresql: DatabaseSecretBackendConnectionPostgresql
postgresql block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#postgresql DatabaseSecretBackendConnection#postgresql}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#postgresql DatabaseSecretBackendConnection#postgresql}
---
@@ -4354,7 +4429,7 @@ redis: DatabaseSecretBackendConnectionRedis
redis block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#redis DatabaseSecretBackendConnection#redis}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#redis DatabaseSecretBackendConnection#redis}
---
@@ -4368,7 +4443,7 @@ redis_elasticache: DatabaseSecretBackendConnectionRedisElasticache
redis_elasticache block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#redis_elasticache DatabaseSecretBackendConnection#redis_elasticache}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#redis_elasticache DatabaseSecretBackendConnection#redis_elasticache}
---
@@ -4382,7 +4457,7 @@ redshift: DatabaseSecretBackendConnectionRedshift
redshift block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#redshift DatabaseSecretBackendConnection#redshift}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#redshift DatabaseSecretBackendConnection#redshift}
---
@@ -4396,7 +4471,7 @@ root_rotation_statements: typing.List[str]
A list of database statements to be executed to rotate the root user's credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#root_rotation_statements DatabaseSecretBackendConnection#root_rotation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#root_rotation_statements DatabaseSecretBackendConnection#root_rotation_statements}
---
@@ -4410,7 +4485,7 @@ snowflake: DatabaseSecretBackendConnectionSnowflake
snowflake block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#snowflake DatabaseSecretBackendConnection#snowflake}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#snowflake DatabaseSecretBackendConnection#snowflake}
---
@@ -4424,7 +4499,7 @@ verify_connection: typing.Union[bool, IResolvable]
Specifies if the connection is verified during initial configuration.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#verify_connection DatabaseSecretBackendConnection#verify_connection}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#verify_connection DatabaseSecretBackendConnection#verify_connection}
---
@@ -4472,7 +4547,7 @@ hosts: typing.List[str]
A set of Couchbase URIs to connect to. Must use `couchbases://` scheme if `tls` is `true`.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#hosts DatabaseSecretBackendConnection#hosts}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#hosts DatabaseSecretBackendConnection#hosts}
---
@@ -4486,7 +4561,7 @@ password: str
Specifies the password corresponding to the given username.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
---
@@ -4500,7 +4575,7 @@ username: str
Specifies the username for Vault to use.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
---
@@ -4516,7 +4591,7 @@ Required if `tls` is `true`.
Specifies the certificate authority of the Couchbase server, as a PEM certificate that has been base64 encoded.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#base64_pem DatabaseSecretBackendConnection#base64_pem}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#base64_pem DatabaseSecretBackendConnection#base64_pem}
---
@@ -4530,7 +4605,7 @@ bucket_name: str
Required for Couchbase versions prior to 6.5.0. This is only used to verify vault's connection to the server.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#bucket_name DatabaseSecretBackendConnection#bucket_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#bucket_name DatabaseSecretBackendConnection#bucket_name}
---
@@ -4544,7 +4619,7 @@ insecure_tls: typing.Union[bool, IResolvable]
Specifies whether to skip verification of the server certificate when using TLS.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls}
---
@@ -4558,7 +4633,7 @@ tls: typing.Union[bool, IResolvable]
Specifies whether to use TLS when connecting to Couchbase.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls}
---
@@ -4572,7 +4647,7 @@ username_template: str
Template describing how dynamic usernames are generated.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
---
@@ -4624,7 +4699,7 @@ password: str
The password to be used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
---
@@ -4638,7 +4713,7 @@ url: str
The URL for Elasticsearch's API.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#url DatabaseSecretBackendConnection#url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#url DatabaseSecretBackendConnection#url}
---
@@ -4652,7 +4727,7 @@ username: str
The username to be used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
---
@@ -4666,7 +4741,7 @@ ca_cert: str
The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#ca_cert DatabaseSecretBackendConnection#ca_cert}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#ca_cert DatabaseSecretBackendConnection#ca_cert}
---
@@ -4680,7 +4755,7 @@ ca_path: str
The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#ca_path DatabaseSecretBackendConnection#ca_path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#ca_path DatabaseSecretBackendConnection#ca_path}
---
@@ -4694,7 +4769,7 @@ client_cert: str
The path to the certificate for the Elasticsearch client to present for communication.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#client_cert DatabaseSecretBackendConnection#client_cert}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#client_cert DatabaseSecretBackendConnection#client_cert}
---
@@ -4708,7 +4783,7 @@ client_key: str
The path to the key for the Elasticsearch client to use for communication.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#client_key DatabaseSecretBackendConnection#client_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#client_key DatabaseSecretBackendConnection#client_key}
---
@@ -4722,7 +4797,7 @@ insecure: typing.Union[bool, IResolvable]
Whether to disable certificate verification.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#insecure DatabaseSecretBackendConnection#insecure}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#insecure DatabaseSecretBackendConnection#insecure}
---
@@ -4736,7 +4811,7 @@ tls_server_name: str
This, if set, is used to set the SNI host when connecting via TLS.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_server_name DatabaseSecretBackendConnection#tls_server_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_server_name DatabaseSecretBackendConnection#tls_server_name}
---
@@ -4750,7 +4825,7 @@ username_template: str
Template describing how dynamic usernames are generated.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
---
@@ -4796,7 +4871,7 @@ connection_url: str
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
---
@@ -4810,7 +4885,7 @@ disable_escaping: typing.Union[bool, IResolvable]
Disable special character escaping in username and password.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping}
---
@@ -4824,7 +4899,7 @@ max_connection_lifetime: typing.Union[int, float]
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
---
@@ -4838,7 +4913,7 @@ max_idle_connections: typing.Union[int, float]
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
---
@@ -4852,7 +4927,7 @@ max_open_connections: typing.Union[int, float]
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
---
@@ -4866,7 +4941,7 @@ password: str
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
---
@@ -4880,7 +4955,7 @@ username: str
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
---
@@ -4932,7 +5007,7 @@ host: str
Influxdb host to connect to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#host DatabaseSecretBackendConnection#host}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#host DatabaseSecretBackendConnection#host}
---
@@ -4946,7 +5021,7 @@ password: str
Specifies the password corresponding to the given username.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
---
@@ -4960,7 +5035,7 @@ username: str
Specifies the username to use for superuser access.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
---
@@ -4974,7 +5049,7 @@ connect_timeout: typing.Union[int, float]
The number of seconds to use as a connection timeout.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connect_timeout DatabaseSecretBackendConnection#connect_timeout}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connect_timeout DatabaseSecretBackendConnection#connect_timeout}
---
@@ -4988,7 +5063,7 @@ insecure_tls: typing.Union[bool, IResolvable]
Whether to skip verification of the server certificate when using TLS.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls}
---
@@ -5004,7 +5079,7 @@ Concatenated PEM blocks containing a certificate and private key;
a certificate, private key, and issuing CA certificate; or just a CA certificate.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#pem_bundle DatabaseSecretBackendConnection#pem_bundle}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#pem_bundle DatabaseSecretBackendConnection#pem_bundle}
---
@@ -5020,7 +5095,7 @@ Specifies JSON containing a certificate and private key;
a certificate, private key, and issuing CA certificate; or just a CA certificate.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#pem_json DatabaseSecretBackendConnection#pem_json}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#pem_json DatabaseSecretBackendConnection#pem_json}
---
@@ -5034,7 +5109,7 @@ port: typing.Union[int, float]
The transport port to use to connect to Influxdb.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port}
---
@@ -5048,7 +5123,7 @@ tls: typing.Union[bool, IResolvable]
Whether to use TLS when connecting to Influxdb.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls}
---
@@ -5062,7 +5137,7 @@ username_template: str
Template describing how dynamic usernames are generated.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
---
@@ -5108,7 +5183,7 @@ connection_url: str
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
---
@@ -5122,7 +5197,7 @@ max_connection_lifetime: typing.Union[int, float]
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
---
@@ -5136,7 +5211,7 @@ max_idle_connections: typing.Union[int, float]
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
---
@@ -5150,7 +5225,7 @@ max_open_connections: typing.Union[int, float]
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
---
@@ -5164,7 +5239,7 @@ password: str
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
---
@@ -5178,7 +5253,7 @@ username: str
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
---
@@ -5192,7 +5267,7 @@ username_template: str
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
---
@@ -5230,7 +5305,7 @@ private_key: str
The Private Programmatic API Key used to connect with MongoDB Atlas API.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#private_key DatabaseSecretBackendConnection#private_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#private_key DatabaseSecretBackendConnection#private_key}
---
@@ -5244,7 +5319,7 @@ project_id: str
The Project ID the Database User should be created within.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#project_id DatabaseSecretBackendConnection#project_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#project_id DatabaseSecretBackendConnection#project_id}
---
@@ -5258,7 +5333,7 @@ public_key: str
The Public Programmatic API Key used to authenticate with the MongoDB Atlas API.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#public_key DatabaseSecretBackendConnection#public_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#public_key DatabaseSecretBackendConnection#public_key}
---
@@ -5308,7 +5383,7 @@ connection_url: str
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
---
@@ -5322,7 +5397,7 @@ contained_db: typing.Union[bool, IResolvable]
Set to true when the target is a Contained Database, e.g. AzureSQL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#contained_db DatabaseSecretBackendConnection#contained_db}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#contained_db DatabaseSecretBackendConnection#contained_db}
---
@@ -5336,7 +5411,7 @@ disable_escaping: typing.Union[bool, IResolvable]
Disable special character escaping in username and password.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping}
---
@@ -5350,7 +5425,7 @@ max_connection_lifetime: typing.Union[int, float]
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
---
@@ -5364,7 +5439,7 @@ max_idle_connections: typing.Union[int, float]
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
---
@@ -5378,7 +5453,7 @@ max_open_connections: typing.Union[int, float]
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
---
@@ -5392,7 +5467,7 @@ password: str
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
---
@@ -5406,7 +5481,7 @@ username: str
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
---
@@ -5420,7 +5495,7 @@ username_template: str
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
---
@@ -5474,7 +5549,7 @@ auth_type: str
Specify alternative authorization type. (Only 'gcp_iam' is valid currently).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type}
---
@@ -5488,7 +5563,7 @@ connection_url: str
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
---
@@ -5502,7 +5577,7 @@ max_connection_lifetime: typing.Union[int, float]
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
---
@@ -5516,7 +5591,7 @@ max_idle_connections: typing.Union[int, float]
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
---
@@ -5530,7 +5605,7 @@ max_open_connections: typing.Union[int, float]
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
---
@@ -5544,7 +5619,7 @@ password: str
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
---
@@ -5558,7 +5633,7 @@ service_account_json: str
A JSON encoded credential for use with IAM authorization.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json}
---
@@ -5572,7 +5647,7 @@ tls_ca: str
x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca}
---
@@ -5588,7 +5663,7 @@ x509 certificate for connecting to the database.
This must be a PEM encoded version of the private key and the certificate combined.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key}
---
@@ -5602,7 +5677,7 @@ username: str
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
---
@@ -5616,7 +5691,7 @@ username_template: str
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
---
@@ -5670,7 +5745,7 @@ auth_type: str
Specify alternative authorization type. (Only 'gcp_iam' is valid currently).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type}
---
@@ -5684,7 +5759,7 @@ connection_url: str
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
---
@@ -5698,7 +5773,7 @@ max_connection_lifetime: typing.Union[int, float]
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
---
@@ -5712,7 +5787,7 @@ max_idle_connections: typing.Union[int, float]
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
---
@@ -5726,7 +5801,7 @@ max_open_connections: typing.Union[int, float]
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
---
@@ -5740,7 +5815,7 @@ password: str
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
---
@@ -5754,7 +5829,7 @@ service_account_json: str
A JSON encoded credential for use with IAM authorization.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json}
---
@@ -5768,7 +5843,7 @@ tls_ca: str
x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca}
---
@@ -5784,7 +5859,7 @@ x509 certificate for connecting to the database.
This must be a PEM encoded version of the private key and the certificate combined.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key}
---
@@ -5798,7 +5873,7 @@ username: str
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
---
@@ -5812,7 +5887,7 @@ username_template: str
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
---
@@ -5866,7 +5941,7 @@ auth_type: str
Specify alternative authorization type. (Only 'gcp_iam' is valid currently).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type}
---
@@ -5880,7 +5955,7 @@ connection_url: str
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
---
@@ -5894,7 +5969,7 @@ max_connection_lifetime: typing.Union[int, float]
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
---
@@ -5908,7 +5983,7 @@ max_idle_connections: typing.Union[int, float]
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
---
@@ -5922,7 +5997,7 @@ max_open_connections: typing.Union[int, float]
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
---
@@ -5936,7 +6011,7 @@ password: str
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
---
@@ -5950,7 +6025,7 @@ service_account_json: str
A JSON encoded credential for use with IAM authorization.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json}
---
@@ -5964,7 +6039,7 @@ tls_ca: str
x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca}
---
@@ -5980,7 +6055,7 @@ x509 certificate for connecting to the database.
This must be a PEM encoded version of the private key and the certificate combined.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key}
---
@@ -5994,7 +6069,7 @@ username: str
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
---
@@ -6008,7 +6083,7 @@ username_template: str
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
---
@@ -6062,7 +6137,7 @@ auth_type: str
Specify alternative authorization type. (Only 'gcp_iam' is valid currently).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type}
---
@@ -6076,7 +6151,7 @@ connection_url: str
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
---
@@ -6090,7 +6165,7 @@ max_connection_lifetime: typing.Union[int, float]
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
---
@@ -6104,7 +6179,7 @@ max_idle_connections: typing.Union[int, float]
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
---
@@ -6118,7 +6193,7 @@ max_open_connections: typing.Union[int, float]
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
---
@@ -6132,7 +6207,7 @@ password: str
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
---
@@ -6146,7 +6221,7 @@ service_account_json: str
A JSON encoded credential for use with IAM authorization.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json}
---
@@ -6160,7 +6235,7 @@ tls_ca: str
x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca}
---
@@ -6176,7 +6251,7 @@ x509 certificate for connecting to the database.
This must be a PEM encoded version of the private key and the certificate combined.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key}
---
@@ -6190,7 +6265,7 @@ username: str
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
---
@@ -6204,7 +6279,7 @@ username_template: str
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
---
@@ -6254,7 +6329,7 @@ connection_url: str
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
---
@@ -6268,7 +6343,7 @@ disconnect_sessions: typing.Union[bool, IResolvable]
Set to true to disconnect any open sessions prior to running the revocation statements.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#disconnect_sessions DatabaseSecretBackendConnection#disconnect_sessions}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#disconnect_sessions DatabaseSecretBackendConnection#disconnect_sessions}
---
@@ -6282,7 +6357,7 @@ max_connection_lifetime: typing.Union[int, float]
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
---
@@ -6296,7 +6371,7 @@ max_idle_connections: typing.Union[int, float]
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
---
@@ -6310,7 +6385,7 @@ max_open_connections: typing.Union[int, float]
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
---
@@ -6324,7 +6399,7 @@ password: str
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
---
@@ -6338,7 +6413,7 @@ split_statements: typing.Union[bool, IResolvable]
Set to true in order to split statements after semi-colons.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#split_statements DatabaseSecretBackendConnection#split_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#split_statements DatabaseSecretBackendConnection#split_statements}
---
@@ -6352,7 +6427,7 @@ username: str
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
---
@@ -6366,7 +6441,7 @@ username_template: str
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
---
@@ -6385,7 +6460,11 @@ databaseSecretBackendConnection.DatabaseSecretBackendConnectionPostgresql(
max_idle_connections: typing.Union[int, float] = None,
max_open_connections: typing.Union[int, float] = None,
password: str = None,
+ private_key: str = None,
+ self_managed: typing.Union[bool, IResolvable] = None,
service_account_json: str = None,
+ tls_ca: str = None,
+ tls_certificate: str = None,
username: str = None,
username_template: str = None
)
@@ -6402,7 +6481,11 @@ databaseSecretBackendConnection.DatabaseSecretBackendConnectionPostgresql(
| max_idle_connections
| typing.Union[int, float]
| Maximum number of idle connections to the database. |
| max_open_connections
| typing.Union[int, float]
| Maximum number of open connections to the database. |
| password
| str
| The root credential password used in the connection URL. |
+| private_key
| str
| The secret key used for the x509 client certificate. Must be PEM encoded. |
+| self_managed
| typing.Union[bool, cdktf.IResolvable]
| If set, allows onboarding static roles with a rootless connection configuration. |
| service_account_json
| str
| A JSON encoded credential for use with IAM authorization. |
+| tls_ca
| str
| The x509 CA file for validating the certificate presented by the PostgreSQL server. Must be PEM encoded. |
+| tls_certificate
| str
| The x509 client certificate for connecting to the database. Must be PEM encoded. |
| username
| str
| The root credential username used in the connection URL. |
| username_template
| str
| Username generation template. |
@@ -6418,7 +6501,7 @@ auth_type: str
Specify alternative authorization type. (Only 'gcp_iam' is valid currently).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type}
---
@@ -6432,7 +6515,7 @@ connection_url: str
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
---
@@ -6446,7 +6529,7 @@ disable_escaping: typing.Union[bool, IResolvable]
Disable special character escaping in username and password.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping}
---
@@ -6460,7 +6543,7 @@ max_connection_lifetime: typing.Union[int, float]
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
---
@@ -6474,7 +6557,7 @@ max_idle_connections: typing.Union[int, float]
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
---
@@ -6488,7 +6571,7 @@ max_open_connections: typing.Union[int, float]
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
---
@@ -6502,7 +6585,35 @@ password: str
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+
+---
+
+##### `private_key`Optional
+
+```python
+private_key: str
+```
+
+- *Type:* str
+
+The secret key used for the x509 client certificate. Must be PEM encoded.
+
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#private_key DatabaseSecretBackendConnection#private_key}
+
+---
+
+##### `self_managed`Optional
+
+```python
+self_managed: typing.Union[bool, IResolvable]
+```
+
+- *Type:* typing.Union[bool, cdktf.IResolvable]
+
+If set, allows onboarding static roles with a rootless connection configuration.
+
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#self_managed DatabaseSecretBackendConnection#self_managed}
---
@@ -6516,7 +6627,35 @@ service_account_json: str
A JSON encoded credential for use with IAM authorization.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json}
+
+---
+
+##### `tls_ca`Optional
+
+```python
+tls_ca: str
+```
+
+- *Type:* str
+
+The x509 CA file for validating the certificate presented by the PostgreSQL server. Must be PEM encoded.
+
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca}
+
+---
+
+##### `tls_certificate`Optional
+
+```python
+tls_certificate: str
+```
+
+- *Type:* str
+
+The x509 client certificate for connecting to the database. Must be PEM encoded.
+
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_certificate DatabaseSecretBackendConnection#tls_certificate}
---
@@ -6530,7 +6669,7 @@ username: str
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
---
@@ -6544,7 +6683,7 @@ username_template: str
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
---
@@ -6590,7 +6729,7 @@ host: str
Specifies the host to connect to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#host DatabaseSecretBackendConnection#host}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#host DatabaseSecretBackendConnection#host}
---
@@ -6604,7 +6743,7 @@ password: str
Specifies the password corresponding to the given username.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
---
@@ -6618,7 +6757,7 @@ username: str
Specifies the username for Vault to use.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
---
@@ -6632,7 +6771,7 @@ ca_cert: str
The contents of a PEM-encoded CA cert file to use to verify the Redis server's identity.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#ca_cert DatabaseSecretBackendConnection#ca_cert}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#ca_cert DatabaseSecretBackendConnection#ca_cert}
---
@@ -6646,7 +6785,7 @@ insecure_tls: typing.Union[bool, IResolvable]
Specifies whether to skip verification of the server certificate when using TLS.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls}
---
@@ -6660,7 +6799,7 @@ port: typing.Union[int, float]
The transport port to use to connect to Redis.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port}
---
@@ -6674,7 +6813,7 @@ tls: typing.Union[bool, IResolvable]
Specifies whether to use TLS when connecting to Redis.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls}
---
@@ -6714,7 +6853,7 @@ url: str
The configuration endpoint for the ElastiCache cluster to connect to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#url DatabaseSecretBackendConnection#url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#url DatabaseSecretBackendConnection#url}
---
@@ -6730,7 +6869,7 @@ The AWS secret key id to use to talk to ElastiCache.
If omitted the credentials chain provider is used instead.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
---
@@ -6746,7 +6885,7 @@ The AWS region where the ElastiCache cluster is hosted.
If omitted the plugin tries to infer the region from the environment.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#region DatabaseSecretBackendConnection#region}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#region DatabaseSecretBackendConnection#region}
---
@@ -6762,7 +6901,7 @@ The AWS access key id to use to talk to ElastiCache.
If omitted the credentials chain provider is used instead.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
---
@@ -6810,7 +6949,7 @@ connection_url: str
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
---
@@ -6824,7 +6963,7 @@ disable_escaping: typing.Union[bool, IResolvable]
Disable special character escaping in username and password.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping}
---
@@ -6838,7 +6977,7 @@ max_connection_lifetime: typing.Union[int, float]
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
---
@@ -6852,7 +6991,7 @@ max_idle_connections: typing.Union[int, float]
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
---
@@ -6866,7 +7005,7 @@ max_open_connections: typing.Union[int, float]
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
---
@@ -6880,7 +7019,7 @@ password: str
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
---
@@ -6894,7 +7033,7 @@ username: str
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
---
@@ -6908,7 +7047,7 @@ username_template: str
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
---
@@ -6954,7 +7093,7 @@ connection_url: str
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
---
@@ -6968,7 +7107,7 @@ max_connection_lifetime: typing.Union[int, float]
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
---
@@ -6982,7 +7121,7 @@ max_idle_connections: typing.Union[int, float]
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
---
@@ -6996,7 +7135,7 @@ max_open_connections: typing.Union[int, float]
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
---
@@ -7010,7 +7149,7 @@ password: str
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
---
@@ -7024,7 +7163,7 @@ username: str
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
---
@@ -7038,7 +7177,7 @@ username_template: str
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
---
@@ -7105,6 +7244,7 @@ The attribute on the parent resource this class is referencing.
| reset_pem_json
| *No description.* |
| reset_port
| *No description.* |
| reset_protocol_version
| *No description.* |
+| reset_skip_verification
| *No description.* |
| reset_tls
| *No description.* |
| reset_username
| *No description.* |
@@ -7330,6 +7470,12 @@ def reset_port() -> None
def reset_protocol_version() -> None
```
+##### `reset_skip_verification`
+
+```python
+def reset_skip_verification() -> None
+```
+
##### `reset_tls`
```python
@@ -7357,6 +7503,7 @@ def reset_username() -> None
| pem_json_input
| str
| *No description.* |
| port_input
| typing.Union[int, float]
| *No description.* |
| protocol_version_input
| typing.Union[int, float]
| *No description.* |
+| skip_verification_input
| typing.Union[bool, cdktf.IResolvable]
| *No description.* |
| tls_input
| typing.Union[bool, cdktf.IResolvable]
| *No description.* |
| username_input
| str
| *No description.* |
| connect_timeout
| typing.Union[int, float]
| *No description.* |
@@ -7367,6 +7514,7 @@ def reset_username() -> None
| pem_json
| str
| *No description.* |
| port
| typing.Union[int, float]
| *No description.* |
| protocol_version
| typing.Union[int, float]
| *No description.* |
+| skip_verification
| typing.Union[bool, cdktf.IResolvable]
| *No description.* |
| tls
| typing.Union[bool, cdktf.IResolvable]
| *No description.* |
| username
| str
| *No description.* |
| internal_value
| DatabaseSecretBackendConnectionCassandra
| *No description.* |
@@ -7477,6 +7625,16 @@ protocol_version_input: typing.Union[int, float]
---
+##### `skip_verification_input`Optional
+
+```python
+skip_verification_input: typing.Union[bool, IResolvable]
+```
+
+- *Type:* typing.Union[bool, cdktf.IResolvable]
+
+---
+
##### `tls_input`Optional
```python
@@ -7577,6 +7735,16 @@ protocol_version: typing.Union[int, float]
---
+##### `skip_verification`Required
+
+```python
+skip_verification: typing.Union[bool, IResolvable]
+```
+
+- *Type:* typing.Union[bool, cdktf.IResolvable]
+
+---
+
##### `tls`Required
```python
@@ -13975,7 +14143,11 @@ The attribute on the parent resource this class is referencing.
| reset_max_idle_connections
| *No description.* |
| reset_max_open_connections
| *No description.* |
| reset_password
| *No description.* |
+| reset_private_key
| *No description.* |
+| reset_self_managed
| *No description.* |
| reset_service_account_json
| *No description.* |
+| reset_tls_ca
| *No description.* |
+| reset_tls_certificate
| *No description.* |
| reset_username
| *No description.* |
| reset_username_template
| *No description.* |
@@ -14195,12 +14367,36 @@ def reset_max_open_connections() -> None
def reset_password() -> None
```
+##### `reset_private_key`
+
+```python
+def reset_private_key() -> None
+```
+
+##### `reset_self_managed`
+
+```python
+def reset_self_managed() -> None
+```
+
##### `reset_service_account_json`
```python
def reset_service_account_json() -> None
```
+##### `reset_tls_ca`
+
+```python
+def reset_tls_ca() -> None
+```
+
+##### `reset_tls_certificate`
+
+```python
+def reset_tls_certificate() -> None
+```
+
##### `reset_username`
```python
@@ -14227,7 +14423,11 @@ def reset_username_template() -> None
| max_idle_connections_input
| typing.Union[int, float]
| *No description.* |
| max_open_connections_input
| typing.Union[int, float]
| *No description.* |
| password_input
| str
| *No description.* |
+| private_key_input
| str
| *No description.* |
+| self_managed_input
| typing.Union[bool, cdktf.IResolvable]
| *No description.* |
| service_account_json_input
| str
| *No description.* |
+| tls_ca_input
| str
| *No description.* |
+| tls_certificate_input
| str
| *No description.* |
| username_input
| str
| *No description.* |
| username_template_input
| str
| *No description.* |
| auth_type
| str
| *No description.* |
@@ -14237,7 +14437,11 @@ def reset_username_template() -> None
| max_idle_connections
| typing.Union[int, float]
| *No description.* |
| max_open_connections
| typing.Union[int, float]
| *No description.* |
| password
| str
| *No description.* |
+| private_key
| str
| *No description.* |
+| self_managed
| typing.Union[bool, cdktf.IResolvable]
| *No description.* |
| service_account_json
| str
| *No description.* |
+| tls_ca
| str
| *No description.* |
+| tls_certificate
| str
| *No description.* |
| username
| str
| *No description.* |
| username_template
| str
| *No description.* |
| internal_value
| DatabaseSecretBackendConnectionPostgresql
| *No description.* |
@@ -14338,6 +14542,26 @@ password_input: str
---
+##### `private_key_input`Optional
+
+```python
+private_key_input: str
+```
+
+- *Type:* str
+
+---
+
+##### `self_managed_input`Optional
+
+```python
+self_managed_input: typing.Union[bool, IResolvable]
+```
+
+- *Type:* typing.Union[bool, cdktf.IResolvable]
+
+---
+
##### `service_account_json_input`Optional
```python
@@ -14348,6 +14572,26 @@ service_account_json_input: str
---
+##### `tls_ca_input`Optional
+
+```python
+tls_ca_input: str
+```
+
+- *Type:* str
+
+---
+
+##### `tls_certificate_input`Optional
+
+```python
+tls_certificate_input: str
+```
+
+- *Type:* str
+
+---
+
##### `username_input`Optional
```python
@@ -14438,6 +14682,26 @@ password: str
---
+##### `private_key`Required
+
+```python
+private_key: str
+```
+
+- *Type:* str
+
+---
+
+##### `self_managed`Required
+
+```python
+self_managed: typing.Union[bool, IResolvable]
+```
+
+- *Type:* typing.Union[bool, cdktf.IResolvable]
+
+---
+
##### `service_account_json`Required
```python
@@ -14448,6 +14712,26 @@ service_account_json: str
---
+##### `tls_ca`Required
+
+```python
+tls_ca: str
+```
+
+- *Type:* str
+
+---
+
+##### `tls_certificate`Required
+
+```python
+tls_certificate: str
+```
+
+- *Type:* str
+
+---
+
##### `username`Required
```python
diff --git a/docs/databaseSecretBackendConnection.typescript.md b/docs/databaseSecretBackendConnection.typescript.md
index 6c3580ad..7a41e3dd 100644
--- a/docs/databaseSecretBackendConnection.typescript.md
+++ b/docs/databaseSecretBackendConnection.typescript.md
@@ -4,7 +4,7 @@
### DatabaseSecretBackendConnection
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection vault_database_secret_backend_connection}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection vault_database_secret_backend_connection}.
#### Initializers
@@ -876,7 +876,7 @@ The construct id used in the generated config for the DatabaseSecretBackendConne
The id of the existing DatabaseSecretBackendConnection that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#import import section} in the documentation of this resource for the id to use
---
@@ -1687,6 +1687,7 @@ const databaseSecretBackendConnectionCassandra: databaseSecretBackendConnection.
| pemJson
| string
| Specifies JSON containing a certificate and private key; |
| port
| number
| The transport port to use to connect to Cassandra. |
| protocolVersion
| number
| The CQL protocol version to use. |
+| skipVerification
| boolean \| cdktf.IResolvable
| Skip permissions checks when a connection to Cassandra is first created. |
| tls
| boolean \| cdktf.IResolvable
| Whether to use TLS when connecting to Cassandra. |
| username
| string
| The username to use when authenticating with Cassandra. |
@@ -1702,7 +1703,7 @@ public readonly connectTimeout: number;
The number of seconds to use as a connection timeout.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connect_timeout DatabaseSecretBackendConnection#connect_timeout}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connect_timeout DatabaseSecretBackendConnection#connect_timeout}
---
@@ -1716,7 +1717,7 @@ public readonly hosts: string[];
Cassandra hosts to connect to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#hosts DatabaseSecretBackendConnection#hosts}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#hosts DatabaseSecretBackendConnection#hosts}
---
@@ -1730,7 +1731,7 @@ public readonly insecureTls: boolean | IResolvable;
Whether to skip verification of the server certificate when using TLS.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls}
---
@@ -1744,7 +1745,7 @@ public readonly password: string;
The password to use when authenticating with Cassandra.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
---
@@ -1760,7 +1761,7 @@ Concatenated PEM blocks containing a certificate and private key;
a certificate, private key, and issuing CA certificate; or just a CA certificate.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#pem_bundle DatabaseSecretBackendConnection#pem_bundle}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#pem_bundle DatabaseSecretBackendConnection#pem_bundle}
---
@@ -1776,7 +1777,7 @@ Specifies JSON containing a certificate and private key;
a certificate, private key, and issuing CA certificate; or just a CA certificate.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#pem_json DatabaseSecretBackendConnection#pem_json}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#pem_json DatabaseSecretBackendConnection#pem_json}
---
@@ -1790,7 +1791,7 @@ public readonly port: number;
The transport port to use to connect to Cassandra.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port}
---
@@ -1804,7 +1805,23 @@ public readonly protocolVersion: number;
The CQL protocol version to use.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#protocol_version DatabaseSecretBackendConnection#protocol_version}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#protocol_version DatabaseSecretBackendConnection#protocol_version}
+
+---
+
+##### `skipVerification`Optional
+
+```typescript
+public readonly skipVerification: boolean | IResolvable;
+```
+
+- *Type:* boolean | cdktf.IResolvable
+
+Skip permissions checks when a connection to Cassandra is first created.
+
+These checks ensure that Vault is able to create roles, but can be resource intensive in clusters with many roles.
+
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#skip_verification DatabaseSecretBackendConnection#skip_verification}
---
@@ -1818,7 +1835,7 @@ public readonly tls: boolean | IResolvable;
Whether to use TLS when connecting to Cassandra.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls}
---
@@ -1832,7 +1849,7 @@ public readonly username: string;
The username to use when authenticating with Cassandra.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
---
@@ -1865,7 +1882,7 @@ const databaseSecretBackendConnectionConfig: databaseSecretBackendConnection.Dat
| data
| {[ key: string ]: string}
| A map of sensitive data to pass to the endpoint. Useful for templated connection strings. |
| elasticsearch
| DatabaseSecretBackendConnectionElasticsearch
| elasticsearch block. |
| hana
| DatabaseSecretBackendConnectionHana
| hana block. |
-| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#id DatabaseSecretBackendConnection#id}. |
+| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#id DatabaseSecretBackendConnection#id}. |
| influxdb
| DatabaseSecretBackendConnectionInfluxdb
| influxdb block. |
| mongodb
| DatabaseSecretBackendConnectionMongodb
| mongodb block. |
| mongodbatlas
| DatabaseSecretBackendConnectionMongodbatlas
| mongodbatlas block. |
@@ -1967,7 +1984,7 @@ public readonly backend: string;
Unique name of the Vault mount to configure.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#backend DatabaseSecretBackendConnection#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#backend DatabaseSecretBackendConnection#backend}
---
@@ -1981,7 +1998,7 @@ public readonly name: string;
Name of the database connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#name DatabaseSecretBackendConnection#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#name DatabaseSecretBackendConnection#name}
---
@@ -1995,7 +2012,7 @@ public readonly allowedRoles: string[];
A list of roles that are allowed to use this connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#allowed_roles DatabaseSecretBackendConnection#allowed_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#allowed_roles DatabaseSecretBackendConnection#allowed_roles}
---
@@ -2009,7 +2026,7 @@ public readonly cassandra: DatabaseSecretBackendConnectionCassandra;
cassandra block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#cassandra DatabaseSecretBackendConnection#cassandra}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#cassandra DatabaseSecretBackendConnection#cassandra}
---
@@ -2023,7 +2040,7 @@ public readonly couchbase: DatabaseSecretBackendConnectionCouchbase;
couchbase block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#couchbase DatabaseSecretBackendConnection#couchbase}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#couchbase DatabaseSecretBackendConnection#couchbase}
---
@@ -2037,7 +2054,7 @@ public readonly data: {[ key: string ]: string};
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#data DatabaseSecretBackendConnection#data}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#data DatabaseSecretBackendConnection#data}
---
@@ -2051,7 +2068,7 @@ public readonly elasticsearch: DatabaseSecretBackendConnectionElasticsearch;
elasticsearch block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#elasticsearch DatabaseSecretBackendConnection#elasticsearch}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#elasticsearch DatabaseSecretBackendConnection#elasticsearch}
---
@@ -2065,7 +2082,7 @@ public readonly hana: DatabaseSecretBackendConnectionHana;
hana block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#hana DatabaseSecretBackendConnection#hana}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#hana DatabaseSecretBackendConnection#hana}
---
@@ -2077,7 +2094,7 @@ public readonly id: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#id DatabaseSecretBackendConnection#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#id DatabaseSecretBackendConnection#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -2094,7 +2111,7 @@ public readonly influxdb: DatabaseSecretBackendConnectionInfluxdb;
influxdb block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#influxdb DatabaseSecretBackendConnection#influxdb}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#influxdb DatabaseSecretBackendConnection#influxdb}
---
@@ -2108,7 +2125,7 @@ public readonly mongodb: DatabaseSecretBackendConnectionMongodb;
mongodb block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#mongodb DatabaseSecretBackendConnection#mongodb}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#mongodb DatabaseSecretBackendConnection#mongodb}
---
@@ -2122,7 +2139,7 @@ public readonly mongodbatlas: DatabaseSecretBackendConnectionMongodbatlas;
mongodbatlas block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#mongodbatlas DatabaseSecretBackendConnection#mongodbatlas}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#mongodbatlas DatabaseSecretBackendConnection#mongodbatlas}
---
@@ -2136,7 +2153,7 @@ public readonly mssql: DatabaseSecretBackendConnectionMssql;
mssql block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#mssql DatabaseSecretBackendConnection#mssql}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#mssql DatabaseSecretBackendConnection#mssql}
---
@@ -2150,7 +2167,7 @@ public readonly mysql: DatabaseSecretBackendConnectionMysql;
mysql block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#mysql DatabaseSecretBackendConnection#mysql}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#mysql DatabaseSecretBackendConnection#mysql}
---
@@ -2164,7 +2181,7 @@ public readonly mysqlAurora: DatabaseSecretBackendConnectionMysqlAurora;
mysql_aurora block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#mysql_aurora DatabaseSecretBackendConnection#mysql_aurora}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#mysql_aurora DatabaseSecretBackendConnection#mysql_aurora}
---
@@ -2178,7 +2195,7 @@ public readonly mysqlLegacy: DatabaseSecretBackendConnectionMysqlLegacy;
mysql_legacy block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#mysql_legacy DatabaseSecretBackendConnection#mysql_legacy}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#mysql_legacy DatabaseSecretBackendConnection#mysql_legacy}
---
@@ -2192,7 +2209,7 @@ public readonly mysqlRds: DatabaseSecretBackendConnectionMysqlRds;
mysql_rds block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#mysql_rds DatabaseSecretBackendConnection#mysql_rds}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#mysql_rds DatabaseSecretBackendConnection#mysql_rds}
---
@@ -2206,7 +2223,7 @@ public readonly namespace: string;
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#namespace DatabaseSecretBackendConnection#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#namespace DatabaseSecretBackendConnection#namespace}
---
@@ -2220,7 +2237,7 @@ public readonly oracle: DatabaseSecretBackendConnectionOracle;
oracle block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#oracle DatabaseSecretBackendConnection#oracle}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#oracle DatabaseSecretBackendConnection#oracle}
---
@@ -2236,7 +2253,7 @@ Specifies the name of the plugin to use for this connection.
Must be prefixed with the name of one of the supported database engine types.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#plugin_name DatabaseSecretBackendConnection#plugin_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#plugin_name DatabaseSecretBackendConnection#plugin_name}
---
@@ -2250,7 +2267,7 @@ public readonly postgresql: DatabaseSecretBackendConnectionPostgresql;
postgresql block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#postgresql DatabaseSecretBackendConnection#postgresql}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#postgresql DatabaseSecretBackendConnection#postgresql}
---
@@ -2264,7 +2281,7 @@ public readonly redis: DatabaseSecretBackendConnectionRedis;
redis block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#redis DatabaseSecretBackendConnection#redis}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#redis DatabaseSecretBackendConnection#redis}
---
@@ -2278,7 +2295,7 @@ public readonly redisElasticache: DatabaseSecretBackendConnectionRedisElasticach
redis_elasticache block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#redis_elasticache DatabaseSecretBackendConnection#redis_elasticache}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#redis_elasticache DatabaseSecretBackendConnection#redis_elasticache}
---
@@ -2292,7 +2309,7 @@ public readonly redshift: DatabaseSecretBackendConnectionRedshift;
redshift block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#redshift DatabaseSecretBackendConnection#redshift}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#redshift DatabaseSecretBackendConnection#redshift}
---
@@ -2306,7 +2323,7 @@ public readonly rootRotationStatements: string[];
A list of database statements to be executed to rotate the root user's credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#root_rotation_statements DatabaseSecretBackendConnection#root_rotation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#root_rotation_statements DatabaseSecretBackendConnection#root_rotation_statements}
---
@@ -2320,7 +2337,7 @@ public readonly snowflake: DatabaseSecretBackendConnectionSnowflake;
snowflake block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#snowflake DatabaseSecretBackendConnection#snowflake}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#snowflake DatabaseSecretBackendConnection#snowflake}
---
@@ -2334,7 +2351,7 @@ public readonly verifyConnection: boolean | IResolvable;
Specifies if the connection is verified during initial configuration.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#verify_connection DatabaseSecretBackendConnection#verify_connection}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#verify_connection DatabaseSecretBackendConnection#verify_connection}
---
@@ -2373,7 +2390,7 @@ public readonly hosts: string[];
A set of Couchbase URIs to connect to. Must use `couchbases://` scheme if `tls` is `true`.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#hosts DatabaseSecretBackendConnection#hosts}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#hosts DatabaseSecretBackendConnection#hosts}
---
@@ -2387,7 +2404,7 @@ public readonly password: string;
Specifies the password corresponding to the given username.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
---
@@ -2401,7 +2418,7 @@ public readonly username: string;
Specifies the username for Vault to use.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
---
@@ -2417,7 +2434,7 @@ Required if `tls` is `true`.
Specifies the certificate authority of the Couchbase server, as a PEM certificate that has been base64 encoded.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#base64_pem DatabaseSecretBackendConnection#base64_pem}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#base64_pem DatabaseSecretBackendConnection#base64_pem}
---
@@ -2431,7 +2448,7 @@ public readonly bucketName: string;
Required for Couchbase versions prior to 6.5.0. This is only used to verify vault's connection to the server.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#bucket_name DatabaseSecretBackendConnection#bucket_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#bucket_name DatabaseSecretBackendConnection#bucket_name}
---
@@ -2445,7 +2462,7 @@ public readonly insecureTls: boolean | IResolvable;
Specifies whether to skip verification of the server certificate when using TLS.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls}
---
@@ -2459,7 +2476,7 @@ public readonly tls: boolean | IResolvable;
Specifies whether to use TLS when connecting to Couchbase.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls}
---
@@ -2473,7 +2490,7 @@ public readonly usernameTemplate: string;
Template describing how dynamic usernames are generated.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
---
@@ -2514,7 +2531,7 @@ public readonly password: string;
The password to be used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
---
@@ -2528,7 +2545,7 @@ public readonly url: string;
The URL for Elasticsearch's API.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#url DatabaseSecretBackendConnection#url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#url DatabaseSecretBackendConnection#url}
---
@@ -2542,7 +2559,7 @@ public readonly username: string;
The username to be used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
---
@@ -2556,7 +2573,7 @@ public readonly caCert: string;
The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#ca_cert DatabaseSecretBackendConnection#ca_cert}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#ca_cert DatabaseSecretBackendConnection#ca_cert}
---
@@ -2570,7 +2587,7 @@ public readonly caPath: string;
The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#ca_path DatabaseSecretBackendConnection#ca_path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#ca_path DatabaseSecretBackendConnection#ca_path}
---
@@ -2584,7 +2601,7 @@ public readonly clientCert: string;
The path to the certificate for the Elasticsearch client to present for communication.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#client_cert DatabaseSecretBackendConnection#client_cert}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#client_cert DatabaseSecretBackendConnection#client_cert}
---
@@ -2598,7 +2615,7 @@ public readonly clientKey: string;
The path to the key for the Elasticsearch client to use for communication.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#client_key DatabaseSecretBackendConnection#client_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#client_key DatabaseSecretBackendConnection#client_key}
---
@@ -2612,7 +2629,7 @@ public readonly insecure: boolean | IResolvable;
Whether to disable certificate verification.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#insecure DatabaseSecretBackendConnection#insecure}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#insecure DatabaseSecretBackendConnection#insecure}
---
@@ -2626,7 +2643,7 @@ public readonly tlsServerName: string;
This, if set, is used to set the SNI host when connecting via TLS.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_server_name DatabaseSecretBackendConnection#tls_server_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_server_name DatabaseSecretBackendConnection#tls_server_name}
---
@@ -2640,7 +2657,7 @@ public readonly usernameTemplate: string;
Template describing how dynamic usernames are generated.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
---
@@ -2678,7 +2695,7 @@ public readonly connectionUrl: string;
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
---
@@ -2692,7 +2709,7 @@ public readonly disableEscaping: boolean | IResolvable;
Disable special character escaping in username and password.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping}
---
@@ -2706,7 +2723,7 @@ public readonly maxConnectionLifetime: number;
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
---
@@ -2720,7 +2737,7 @@ public readonly maxIdleConnections: number;
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
---
@@ -2734,7 +2751,7 @@ public readonly maxOpenConnections: number;
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
---
@@ -2748,7 +2765,7 @@ public readonly password: string;
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
---
@@ -2762,7 +2779,7 @@ public readonly username: string;
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
---
@@ -2803,7 +2820,7 @@ public readonly host: string;
Influxdb host to connect to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#host DatabaseSecretBackendConnection#host}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#host DatabaseSecretBackendConnection#host}
---
@@ -2817,7 +2834,7 @@ public readonly password: string;
Specifies the password corresponding to the given username.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
---
@@ -2831,7 +2848,7 @@ public readonly username: string;
Specifies the username to use for superuser access.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
---
@@ -2845,7 +2862,7 @@ public readonly connectTimeout: number;
The number of seconds to use as a connection timeout.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connect_timeout DatabaseSecretBackendConnection#connect_timeout}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connect_timeout DatabaseSecretBackendConnection#connect_timeout}
---
@@ -2859,7 +2876,7 @@ public readonly insecureTls: boolean | IResolvable;
Whether to skip verification of the server certificate when using TLS.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls}
---
@@ -2875,7 +2892,7 @@ Concatenated PEM blocks containing a certificate and private key;
a certificate, private key, and issuing CA certificate; or just a CA certificate.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#pem_bundle DatabaseSecretBackendConnection#pem_bundle}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#pem_bundle DatabaseSecretBackendConnection#pem_bundle}
---
@@ -2891,7 +2908,7 @@ Specifies JSON containing a certificate and private key;
a certificate, private key, and issuing CA certificate; or just a CA certificate.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#pem_json DatabaseSecretBackendConnection#pem_json}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#pem_json DatabaseSecretBackendConnection#pem_json}
---
@@ -2905,7 +2922,7 @@ public readonly port: number;
The transport port to use to connect to Influxdb.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port}
---
@@ -2919,7 +2936,7 @@ public readonly tls: boolean | IResolvable;
Whether to use TLS when connecting to Influxdb.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls}
---
@@ -2933,7 +2950,7 @@ public readonly usernameTemplate: string;
Template describing how dynamic usernames are generated.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
---
@@ -2971,7 +2988,7 @@ public readonly connectionUrl: string;
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
---
@@ -2985,7 +3002,7 @@ public readonly maxConnectionLifetime: number;
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
---
@@ -2999,7 +3016,7 @@ public readonly maxIdleConnections: number;
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
---
@@ -3013,7 +3030,7 @@ public readonly maxOpenConnections: number;
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
---
@@ -3027,7 +3044,7 @@ public readonly password: string;
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
---
@@ -3041,7 +3058,7 @@ public readonly username: string;
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
---
@@ -3055,7 +3072,7 @@ public readonly usernameTemplate: string;
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
---
@@ -3089,7 +3106,7 @@ public readonly privateKey: string;
The Private Programmatic API Key used to connect with MongoDB Atlas API.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#private_key DatabaseSecretBackendConnection#private_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#private_key DatabaseSecretBackendConnection#private_key}
---
@@ -3103,7 +3120,7 @@ public readonly projectId: string;
The Project ID the Database User should be created within.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#project_id DatabaseSecretBackendConnection#project_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#project_id DatabaseSecretBackendConnection#project_id}
---
@@ -3117,7 +3134,7 @@ public readonly publicKey: string;
The Public Programmatic API Key used to authenticate with the MongoDB Atlas API.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#public_key DatabaseSecretBackendConnection#public_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#public_key DatabaseSecretBackendConnection#public_key}
---
@@ -3157,7 +3174,7 @@ public readonly connectionUrl: string;
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
---
@@ -3171,7 +3188,7 @@ public readonly containedDb: boolean | IResolvable;
Set to true when the target is a Contained Database, e.g. AzureSQL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#contained_db DatabaseSecretBackendConnection#contained_db}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#contained_db DatabaseSecretBackendConnection#contained_db}
---
@@ -3185,7 +3202,7 @@ public readonly disableEscaping: boolean | IResolvable;
Disable special character escaping in username and password.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping}
---
@@ -3199,7 +3216,7 @@ public readonly maxConnectionLifetime: number;
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
---
@@ -3213,7 +3230,7 @@ public readonly maxIdleConnections: number;
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
---
@@ -3227,7 +3244,7 @@ public readonly maxOpenConnections: number;
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
---
@@ -3241,7 +3258,7 @@ public readonly password: string;
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
---
@@ -3255,7 +3272,7 @@ public readonly username: string;
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
---
@@ -3269,7 +3286,7 @@ public readonly usernameTemplate: string;
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
---
@@ -3311,7 +3328,7 @@ public readonly authType: string;
Specify alternative authorization type. (Only 'gcp_iam' is valid currently).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type}
---
@@ -3325,7 +3342,7 @@ public readonly connectionUrl: string;
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
---
@@ -3339,7 +3356,7 @@ public readonly maxConnectionLifetime: number;
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
---
@@ -3353,7 +3370,7 @@ public readonly maxIdleConnections: number;
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
---
@@ -3367,7 +3384,7 @@ public readonly maxOpenConnections: number;
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
---
@@ -3381,7 +3398,7 @@ public readonly password: string;
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
---
@@ -3395,7 +3412,7 @@ public readonly serviceAccountJson: string;
A JSON encoded credential for use with IAM authorization.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json}
---
@@ -3409,7 +3426,7 @@ public readonly tlsCa: string;
x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca}
---
@@ -3425,7 +3442,7 @@ x509 certificate for connecting to the database.
This must be a PEM encoded version of the private key and the certificate combined.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key}
---
@@ -3439,7 +3456,7 @@ public readonly username: string;
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
---
@@ -3453,7 +3470,7 @@ public readonly usernameTemplate: string;
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
---
@@ -3495,7 +3512,7 @@ public readonly authType: string;
Specify alternative authorization type. (Only 'gcp_iam' is valid currently).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type}
---
@@ -3509,7 +3526,7 @@ public readonly connectionUrl: string;
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
---
@@ -3523,7 +3540,7 @@ public readonly maxConnectionLifetime: number;
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
---
@@ -3537,7 +3554,7 @@ public readonly maxIdleConnections: number;
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
---
@@ -3551,7 +3568,7 @@ public readonly maxOpenConnections: number;
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
---
@@ -3565,7 +3582,7 @@ public readonly password: string;
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
---
@@ -3579,7 +3596,7 @@ public readonly serviceAccountJson: string;
A JSON encoded credential for use with IAM authorization.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json}
---
@@ -3593,7 +3610,7 @@ public readonly tlsCa: string;
x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca}
---
@@ -3609,7 +3626,7 @@ x509 certificate for connecting to the database.
This must be a PEM encoded version of the private key and the certificate combined.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key}
---
@@ -3623,7 +3640,7 @@ public readonly username: string;
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
---
@@ -3637,7 +3654,7 @@ public readonly usernameTemplate: string;
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
---
@@ -3679,7 +3696,7 @@ public readonly authType: string;
Specify alternative authorization type. (Only 'gcp_iam' is valid currently).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type}
---
@@ -3693,7 +3710,7 @@ public readonly connectionUrl: string;
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
---
@@ -3707,7 +3724,7 @@ public readonly maxConnectionLifetime: number;
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
---
@@ -3721,7 +3738,7 @@ public readonly maxIdleConnections: number;
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
---
@@ -3735,7 +3752,7 @@ public readonly maxOpenConnections: number;
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
---
@@ -3749,7 +3766,7 @@ public readonly password: string;
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
---
@@ -3763,7 +3780,7 @@ public readonly serviceAccountJson: string;
A JSON encoded credential for use with IAM authorization.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json}
---
@@ -3777,7 +3794,7 @@ public readonly tlsCa: string;
x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca}
---
@@ -3793,7 +3810,7 @@ x509 certificate for connecting to the database.
This must be a PEM encoded version of the private key and the certificate combined.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key}
---
@@ -3807,7 +3824,7 @@ public readonly username: string;
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
---
@@ -3821,7 +3838,7 @@ public readonly usernameTemplate: string;
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
---
@@ -3863,7 +3880,7 @@ public readonly authType: string;
Specify alternative authorization type. (Only 'gcp_iam' is valid currently).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type}
---
@@ -3877,7 +3894,7 @@ public readonly connectionUrl: string;
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
---
@@ -3891,7 +3908,7 @@ public readonly maxConnectionLifetime: number;
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
---
@@ -3905,7 +3922,7 @@ public readonly maxIdleConnections: number;
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
---
@@ -3919,7 +3936,7 @@ public readonly maxOpenConnections: number;
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
---
@@ -3933,7 +3950,7 @@ public readonly password: string;
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
---
@@ -3947,7 +3964,7 @@ public readonly serviceAccountJson: string;
A JSON encoded credential for use with IAM authorization.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json}
---
@@ -3961,7 +3978,7 @@ public readonly tlsCa: string;
x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca}
---
@@ -3977,7 +3994,7 @@ x509 certificate for connecting to the database.
This must be a PEM encoded version of the private key and the certificate combined.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key}
---
@@ -3991,7 +4008,7 @@ public readonly username: string;
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
---
@@ -4005,7 +4022,7 @@ public readonly usernameTemplate: string;
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
---
@@ -4045,7 +4062,7 @@ public readonly connectionUrl: string;
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
---
@@ -4059,7 +4076,7 @@ public readonly disconnectSessions: boolean | IResolvable;
Set to true to disconnect any open sessions prior to running the revocation statements.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#disconnect_sessions DatabaseSecretBackendConnection#disconnect_sessions}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#disconnect_sessions DatabaseSecretBackendConnection#disconnect_sessions}
---
@@ -4073,7 +4090,7 @@ public readonly maxConnectionLifetime: number;
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
---
@@ -4087,7 +4104,7 @@ public readonly maxIdleConnections: number;
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
---
@@ -4101,7 +4118,7 @@ public readonly maxOpenConnections: number;
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
---
@@ -4115,7 +4132,7 @@ public readonly password: string;
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
---
@@ -4129,7 +4146,7 @@ public readonly splitStatements: boolean | IResolvable;
Set to true in order to split statements after semi-colons.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#split_statements DatabaseSecretBackendConnection#split_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#split_statements DatabaseSecretBackendConnection#split_statements}
---
@@ -4143,7 +4160,7 @@ public readonly username: string;
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
---
@@ -4157,7 +4174,7 @@ public readonly usernameTemplate: string;
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
---
@@ -4182,7 +4199,11 @@ const databaseSecretBackendConnectionPostgresql: databaseSecretBackendConnection
| maxIdleConnections
| number
| Maximum number of idle connections to the database. |
| maxOpenConnections
| number
| Maximum number of open connections to the database. |
| password
| string
| The root credential password used in the connection URL. |
+| privateKey
| string
| The secret key used for the x509 client certificate. Must be PEM encoded. |
+| selfManaged
| boolean \| cdktf.IResolvable
| If set, allows onboarding static roles with a rootless connection configuration. |
| serviceAccountJson
| string
| A JSON encoded credential for use with IAM authorization. |
+| tlsCa
| string
| The x509 CA file for validating the certificate presented by the PostgreSQL server. Must be PEM encoded. |
+| tlsCertificate
| string
| The x509 client certificate for connecting to the database. Must be PEM encoded. |
| username
| string
| The root credential username used in the connection URL. |
| usernameTemplate
| string
| Username generation template. |
@@ -4198,7 +4219,7 @@ public readonly authType: string;
Specify alternative authorization type. (Only 'gcp_iam' is valid currently).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type}
---
@@ -4212,7 +4233,7 @@ public readonly connectionUrl: string;
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
---
@@ -4226,7 +4247,7 @@ public readonly disableEscaping: boolean | IResolvable;
Disable special character escaping in username and password.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping}
---
@@ -4240,7 +4261,7 @@ public readonly maxConnectionLifetime: number;
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
---
@@ -4254,7 +4275,7 @@ public readonly maxIdleConnections: number;
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
---
@@ -4268,7 +4289,7 @@ public readonly maxOpenConnections: number;
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
---
@@ -4282,7 +4303,35 @@ public readonly password: string;
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+
+---
+
+##### `privateKey`Optional
+
+```typescript
+public readonly privateKey: string;
+```
+
+- *Type:* string
+
+The secret key used for the x509 client certificate. Must be PEM encoded.
+
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#private_key DatabaseSecretBackendConnection#private_key}
+
+---
+
+##### `selfManaged`Optional
+
+```typescript
+public readonly selfManaged: boolean | IResolvable;
+```
+
+- *Type:* boolean | cdktf.IResolvable
+
+If set, allows onboarding static roles with a rootless connection configuration.
+
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#self_managed DatabaseSecretBackendConnection#self_managed}
---
@@ -4296,7 +4345,35 @@ public readonly serviceAccountJson: string;
A JSON encoded credential for use with IAM authorization.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json}
+
+---
+
+##### `tlsCa`Optional
+
+```typescript
+public readonly tlsCa: string;
+```
+
+- *Type:* string
+
+The x509 CA file for validating the certificate presented by the PostgreSQL server. Must be PEM encoded.
+
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca}
+
+---
+
+##### `tlsCertificate`Optional
+
+```typescript
+public readonly tlsCertificate: string;
+```
+
+- *Type:* string
+
+The x509 client certificate for connecting to the database. Must be PEM encoded.
+
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_certificate DatabaseSecretBackendConnection#tls_certificate}
---
@@ -4310,7 +4387,7 @@ public readonly username: string;
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
---
@@ -4324,7 +4401,7 @@ public readonly usernameTemplate: string;
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
---
@@ -4362,7 +4439,7 @@ public readonly host: string;
Specifies the host to connect to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#host DatabaseSecretBackendConnection#host}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#host DatabaseSecretBackendConnection#host}
---
@@ -4376,7 +4453,7 @@ public readonly password: string;
Specifies the password corresponding to the given username.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
---
@@ -4390,7 +4467,7 @@ public readonly username: string;
Specifies the username for Vault to use.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
---
@@ -4404,7 +4481,7 @@ public readonly caCert: string;
The contents of a PEM-encoded CA cert file to use to verify the Redis server's identity.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#ca_cert DatabaseSecretBackendConnection#ca_cert}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#ca_cert DatabaseSecretBackendConnection#ca_cert}
---
@@ -4418,7 +4495,7 @@ public readonly insecureTls: boolean | IResolvable;
Specifies whether to skip verification of the server certificate when using TLS.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls}
---
@@ -4432,7 +4509,7 @@ public readonly port: number;
The transport port to use to connect to Redis.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port}
---
@@ -4446,7 +4523,7 @@ public readonly tls: boolean | IResolvable;
Specifies whether to use TLS when connecting to Redis.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls}
---
@@ -4481,7 +4558,7 @@ public readonly url: string;
The configuration endpoint for the ElastiCache cluster to connect to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#url DatabaseSecretBackendConnection#url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#url DatabaseSecretBackendConnection#url}
---
@@ -4497,7 +4574,7 @@ The AWS secret key id to use to talk to ElastiCache.
If omitted the credentials chain provider is used instead.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
---
@@ -4513,7 +4590,7 @@ The AWS region where the ElastiCache cluster is hosted.
If omitted the plugin tries to infer the region from the environment.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#region DatabaseSecretBackendConnection#region}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#region DatabaseSecretBackendConnection#region}
---
@@ -4529,7 +4606,7 @@ The AWS access key id to use to talk to ElastiCache.
If omitted the credentials chain provider is used instead.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
---
@@ -4568,7 +4645,7 @@ public readonly connectionUrl: string;
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
---
@@ -4582,7 +4659,7 @@ public readonly disableEscaping: boolean | IResolvable;
Disable special character escaping in username and password.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping}
---
@@ -4596,7 +4673,7 @@ public readonly maxConnectionLifetime: number;
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
---
@@ -4610,7 +4687,7 @@ public readonly maxIdleConnections: number;
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
---
@@ -4624,7 +4701,7 @@ public readonly maxOpenConnections: number;
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
---
@@ -4638,7 +4715,7 @@ public readonly password: string;
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
---
@@ -4652,7 +4729,7 @@ public readonly username: string;
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
---
@@ -4666,7 +4743,7 @@ public readonly usernameTemplate: string;
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
---
@@ -4704,7 +4781,7 @@ public readonly connectionUrl: string;
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url}
---
@@ -4718,7 +4795,7 @@ public readonly maxConnectionLifetime: number;
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime}
---
@@ -4732,7 +4809,7 @@ public readonly maxIdleConnections: number;
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections}
---
@@ -4746,7 +4823,7 @@ public readonly maxOpenConnections: number;
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections}
---
@@ -4760,7 +4837,7 @@ public readonly password: string;
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password}
---
@@ -4774,7 +4851,7 @@ public readonly username: string;
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username}
---
@@ -4788,7 +4865,7 @@ public readonly usernameTemplate: string;
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template}
---
@@ -4852,6 +4929,7 @@ The attribute on the parent resource this class is referencing.
| resetPemJson
| *No description.* |
| resetPort
| *No description.* |
| resetProtocolVersion
| *No description.* |
+| resetSkipVerification
| *No description.* |
| resetTls
| *No description.* |
| resetUsername
| *No description.* |
@@ -5055,6 +5133,12 @@ public resetPort(): void
public resetProtocolVersion(): void
```
+##### `resetSkipVerification`
+
+```typescript
+public resetSkipVerification(): void
+```
+
##### `resetTls`
```typescript
@@ -5082,6 +5166,7 @@ public resetUsername(): void
| pemJsonInput
| string
| *No description.* |
| portInput
| number
| *No description.* |
| protocolVersionInput
| number
| *No description.* |
+| skipVerificationInput
| boolean \| cdktf.IResolvable
| *No description.* |
| tlsInput
| boolean \| cdktf.IResolvable
| *No description.* |
| usernameInput
| string
| *No description.* |
| connectTimeout
| number
| *No description.* |
@@ -5092,6 +5177,7 @@ public resetUsername(): void
| pemJson
| string
| *No description.* |
| port
| number
| *No description.* |
| protocolVersion
| number
| *No description.* |
+| skipVerification
| boolean \| cdktf.IResolvable
| *No description.* |
| tls
| boolean \| cdktf.IResolvable
| *No description.* |
| username
| string
| *No description.* |
| internalValue
| DatabaseSecretBackendConnectionCassandra
| *No description.* |
@@ -5202,6 +5288,16 @@ public readonly protocolVersionInput: number;
---
+##### `skipVerificationInput`Optional
+
+```typescript
+public readonly skipVerificationInput: boolean | IResolvable;
+```
+
+- *Type:* boolean | cdktf.IResolvable
+
+---
+
##### `tlsInput`Optional
```typescript
@@ -5302,6 +5398,16 @@ public readonly protocolVersion: number;
---
+##### `skipVerification`Required
+
+```typescript
+public readonly skipVerification: boolean | IResolvable;
+```
+
+- *Type:* boolean | cdktf.IResolvable
+
+---
+
##### `tls`Required
```typescript
@@ -11397,7 +11503,11 @@ The attribute on the parent resource this class is referencing.
| resetMaxIdleConnections
| *No description.* |
| resetMaxOpenConnections
| *No description.* |
| resetPassword
| *No description.* |
+| resetPrivateKey
| *No description.* |
+| resetSelfManaged
| *No description.* |
| resetServiceAccountJson
| *No description.* |
+| resetTlsCa
| *No description.* |
+| resetTlsCertificate
| *No description.* |
| resetUsername
| *No description.* |
| resetUsernameTemplate
| *No description.* |
@@ -11595,12 +11705,36 @@ public resetMaxOpenConnections(): void
public resetPassword(): void
```
+##### `resetPrivateKey`
+
+```typescript
+public resetPrivateKey(): void
+```
+
+##### `resetSelfManaged`
+
+```typescript
+public resetSelfManaged(): void
+```
+
##### `resetServiceAccountJson`
```typescript
public resetServiceAccountJson(): void
```
+##### `resetTlsCa`
+
+```typescript
+public resetTlsCa(): void
+```
+
+##### `resetTlsCertificate`
+
+```typescript
+public resetTlsCertificate(): void
+```
+
##### `resetUsername`
```typescript
@@ -11627,7 +11761,11 @@ public resetUsernameTemplate(): void
| maxIdleConnectionsInput
| number
| *No description.* |
| maxOpenConnectionsInput
| number
| *No description.* |
| passwordInput
| string
| *No description.* |
+| privateKeyInput
| string
| *No description.* |
+| selfManagedInput
| boolean \| cdktf.IResolvable
| *No description.* |
| serviceAccountJsonInput
| string
| *No description.* |
+| tlsCaInput
| string
| *No description.* |
+| tlsCertificateInput
| string
| *No description.* |
| usernameInput
| string
| *No description.* |
| usernameTemplateInput
| string
| *No description.* |
| authType
| string
| *No description.* |
@@ -11637,7 +11775,11 @@ public resetUsernameTemplate(): void
| maxIdleConnections
| number
| *No description.* |
| maxOpenConnections
| number
| *No description.* |
| password
| string
| *No description.* |
+| privateKey
| string
| *No description.* |
+| selfManaged
| boolean \| cdktf.IResolvable
| *No description.* |
| serviceAccountJson
| string
| *No description.* |
+| tlsCa
| string
| *No description.* |
+| tlsCertificate
| string
| *No description.* |
| username
| string
| *No description.* |
| usernameTemplate
| string
| *No description.* |
| internalValue
| DatabaseSecretBackendConnectionPostgresql
| *No description.* |
@@ -11738,6 +11880,26 @@ public readonly passwordInput: string;
---
+##### `privateKeyInput`Optional
+
+```typescript
+public readonly privateKeyInput: string;
+```
+
+- *Type:* string
+
+---
+
+##### `selfManagedInput`Optional
+
+```typescript
+public readonly selfManagedInput: boolean | IResolvable;
+```
+
+- *Type:* boolean | cdktf.IResolvable
+
+---
+
##### `serviceAccountJsonInput`Optional
```typescript
@@ -11748,6 +11910,26 @@ public readonly serviceAccountJsonInput: string;
---
+##### `tlsCaInput`Optional
+
+```typescript
+public readonly tlsCaInput: string;
+```
+
+- *Type:* string
+
+---
+
+##### `tlsCertificateInput`Optional
+
+```typescript
+public readonly tlsCertificateInput: string;
+```
+
+- *Type:* string
+
+---
+
##### `usernameInput`Optional
```typescript
@@ -11838,6 +12020,26 @@ public readonly password: string;
---
+##### `privateKey`Required
+
+```typescript
+public readonly privateKey: string;
+```
+
+- *Type:* string
+
+---
+
+##### `selfManaged`Required
+
+```typescript
+public readonly selfManaged: boolean | IResolvable;
+```
+
+- *Type:* boolean | cdktf.IResolvable
+
+---
+
##### `serviceAccountJson`Required
```typescript
@@ -11848,6 +12050,26 @@ public readonly serviceAccountJson: string;
---
+##### `tlsCa`Required
+
+```typescript
+public readonly tlsCa: string;
+```
+
+- *Type:* string
+
+---
+
+##### `tlsCertificate`Required
+
+```typescript
+public readonly tlsCertificate: string;
+```
+
+- *Type:* string
+
+---
+
##### `username`Required
```typescript
diff --git a/docs/databaseSecretBackendRole.csharp.md b/docs/databaseSecretBackendRole.csharp.md
index 3d838cc0..c35699b4 100644
--- a/docs/databaseSecretBackendRole.csharp.md
+++ b/docs/databaseSecretBackendRole.csharp.md
@@ -4,7 +4,7 @@
### DatabaseSecretBackendRole
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role vault_database_secret_backend_role}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role vault_database_secret_backend_role}.
#### Initializers
@@ -530,7 +530,7 @@ The construct id used in the generated config for the DatabaseSecretBackendRole
The id of the existing DatabaseSecretBackendRole that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#import import section} in the documentation of this resource for the id to use
---
@@ -1060,7 +1060,7 @@ new DatabaseSecretBackendRoleConfig {
| CredentialConfig
| System.Collections.Generic.IDictionary
| Specifies the configuration for the given credential_type. |
| CredentialType
| string
| Specifies the type of credential that will be generated for the role. |
| DefaultTtl
| double
| Default TTL for leases associated with this role, in seconds. |
-| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#id DatabaseSecretBackendRole#id}. |
+| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#id DatabaseSecretBackendRole#id}. |
| MaxTtl
| double
| Maximum TTL for leases associated with this role, in seconds. |
| Namespace
| string
| Target namespace. (requires Enterprise). |
| RenewStatements
| string[]
| Database statements to execute to renew a user. |
@@ -1149,7 +1149,7 @@ public string Backend { get; set; }
The path of the Database Secret Backend the role belongs to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#backend DatabaseSecretBackendRole#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#backend DatabaseSecretBackendRole#backend}
---
@@ -1163,7 +1163,7 @@ public string[] CreationStatements { get; set; }
Database statements to execute to create and configure a user.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#creation_statements DatabaseSecretBackendRole#creation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#creation_statements DatabaseSecretBackendRole#creation_statements}
---
@@ -1177,7 +1177,7 @@ public string DbName { get; set; }
Database connection to use for this role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#db_name DatabaseSecretBackendRole#db_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#db_name DatabaseSecretBackendRole#db_name}
---
@@ -1191,7 +1191,7 @@ public string Name { get; set; }
Unique name for the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#name DatabaseSecretBackendRole#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#name DatabaseSecretBackendRole#name}
---
@@ -1205,7 +1205,7 @@ public System.Collections.Generic.IDictionary CredentialConfig {
Specifies the configuration for the given credential_type.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#credential_config DatabaseSecretBackendRole#credential_config}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#credential_config DatabaseSecretBackendRole#credential_config}
---
@@ -1219,7 +1219,7 @@ public string CredentialType { get; set; }
Specifies the type of credential that will be generated for the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#credential_type DatabaseSecretBackendRole#credential_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#credential_type DatabaseSecretBackendRole#credential_type}
---
@@ -1233,7 +1233,7 @@ public double DefaultTtl { get; set; }
Default TTL for leases associated with this role, in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#default_ttl DatabaseSecretBackendRole#default_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#default_ttl DatabaseSecretBackendRole#default_ttl}
---
@@ -1245,7 +1245,7 @@ public string Id { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#id DatabaseSecretBackendRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#id DatabaseSecretBackendRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1262,7 +1262,7 @@ public double MaxTtl { get; set; }
Maximum TTL for leases associated with this role, in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#max_ttl DatabaseSecretBackendRole#max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#max_ttl DatabaseSecretBackendRole#max_ttl}
---
@@ -1276,7 +1276,7 @@ public string Namespace { get; set; }
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#namespace DatabaseSecretBackendRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#namespace DatabaseSecretBackendRole#namespace}
---
@@ -1290,7 +1290,7 @@ public string[] RenewStatements { get; set; }
Database statements to execute to renew a user.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#renew_statements DatabaseSecretBackendRole#renew_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#renew_statements DatabaseSecretBackendRole#renew_statements}
---
@@ -1304,7 +1304,7 @@ public string[] RevocationStatements { get; set; }
Database statements to execute to revoke a user.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#revocation_statements DatabaseSecretBackendRole#revocation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#revocation_statements DatabaseSecretBackendRole#revocation_statements}
---
@@ -1318,7 +1318,7 @@ public string[] RollbackStatements { get; set; }
Database statements to execute to rollback a create operation in the event of an error.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#rollback_statements DatabaseSecretBackendRole#rollback_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#rollback_statements DatabaseSecretBackendRole#rollback_statements}
---
diff --git a/docs/databaseSecretBackendRole.go.md b/docs/databaseSecretBackendRole.go.md
index 965d09e1..9101fc08 100644
--- a/docs/databaseSecretBackendRole.go.md
+++ b/docs/databaseSecretBackendRole.go.md
@@ -4,7 +4,7 @@
### DatabaseSecretBackendRole
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role vault_database_secret_backend_role}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role vault_database_secret_backend_role}.
#### Initializers
@@ -530,7 +530,7 @@ The construct id used in the generated config for the DatabaseSecretBackendRole
The id of the existing DatabaseSecretBackendRole that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#import import section} in the documentation of this resource for the id to use
---
@@ -1060,7 +1060,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretbackend
| CredentialConfig
| *map[string]*string
| Specifies the configuration for the given credential_type. |
| CredentialType
| *string
| Specifies the type of credential that will be generated for the role. |
| DefaultTtl
| *f64
| Default TTL for leases associated with this role, in seconds. |
-| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#id DatabaseSecretBackendRole#id}. |
+| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#id DatabaseSecretBackendRole#id}. |
| MaxTtl
| *f64
| Maximum TTL for leases associated with this role, in seconds. |
| Namespace
| *string
| Target namespace. (requires Enterprise). |
| RenewStatements
| *[]*string
| Database statements to execute to renew a user. |
@@ -1149,7 +1149,7 @@ Backend *string
The path of the Database Secret Backend the role belongs to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#backend DatabaseSecretBackendRole#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#backend DatabaseSecretBackendRole#backend}
---
@@ -1163,7 +1163,7 @@ CreationStatements *[]*string
Database statements to execute to create and configure a user.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#creation_statements DatabaseSecretBackendRole#creation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#creation_statements DatabaseSecretBackendRole#creation_statements}
---
@@ -1177,7 +1177,7 @@ DbName *string
Database connection to use for this role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#db_name DatabaseSecretBackendRole#db_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#db_name DatabaseSecretBackendRole#db_name}
---
@@ -1191,7 +1191,7 @@ Name *string
Unique name for the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#name DatabaseSecretBackendRole#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#name DatabaseSecretBackendRole#name}
---
@@ -1205,7 +1205,7 @@ CredentialConfig *map[string]*string
Specifies the configuration for the given credential_type.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#credential_config DatabaseSecretBackendRole#credential_config}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#credential_config DatabaseSecretBackendRole#credential_config}
---
@@ -1219,7 +1219,7 @@ CredentialType *string
Specifies the type of credential that will be generated for the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#credential_type DatabaseSecretBackendRole#credential_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#credential_type DatabaseSecretBackendRole#credential_type}
---
@@ -1233,7 +1233,7 @@ DefaultTtl *f64
Default TTL for leases associated with this role, in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#default_ttl DatabaseSecretBackendRole#default_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#default_ttl DatabaseSecretBackendRole#default_ttl}
---
@@ -1245,7 +1245,7 @@ Id *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#id DatabaseSecretBackendRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#id DatabaseSecretBackendRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1262,7 +1262,7 @@ MaxTtl *f64
Maximum TTL for leases associated with this role, in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#max_ttl DatabaseSecretBackendRole#max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#max_ttl DatabaseSecretBackendRole#max_ttl}
---
@@ -1276,7 +1276,7 @@ Namespace *string
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#namespace DatabaseSecretBackendRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#namespace DatabaseSecretBackendRole#namespace}
---
@@ -1290,7 +1290,7 @@ RenewStatements *[]*string
Database statements to execute to renew a user.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#renew_statements DatabaseSecretBackendRole#renew_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#renew_statements DatabaseSecretBackendRole#renew_statements}
---
@@ -1304,7 +1304,7 @@ RevocationStatements *[]*string
Database statements to execute to revoke a user.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#revocation_statements DatabaseSecretBackendRole#revocation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#revocation_statements DatabaseSecretBackendRole#revocation_statements}
---
@@ -1318,7 +1318,7 @@ RollbackStatements *[]*string
Database statements to execute to rollback a create operation in the event of an error.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#rollback_statements DatabaseSecretBackendRole#rollback_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#rollback_statements DatabaseSecretBackendRole#rollback_statements}
---
diff --git a/docs/databaseSecretBackendRole.java.md b/docs/databaseSecretBackendRole.java.md
index d328d391..dd315d27 100644
--- a/docs/databaseSecretBackendRole.java.md
+++ b/docs/databaseSecretBackendRole.java.md
@@ -4,7 +4,7 @@
### DatabaseSecretBackendRole
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role vault_database_secret_backend_role}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role vault_database_secret_backend_role}.
#### Initializers
@@ -57,7 +57,7 @@ DatabaseSecretBackendRole.Builder.create(Construct scope, java.lang.String id)
| credentialConfig
| java.util.Map
| Specifies the configuration for the given credential_type. |
| credentialType
| java.lang.String
| Specifies the type of credential that will be generated for the role. |
| defaultTtl
| java.lang.Number
| Default TTL for leases associated with this role, in seconds. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#id DatabaseSecretBackendRole#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#id DatabaseSecretBackendRole#id}. |
| maxTtl
| java.lang.Number
| Maximum TTL for leases associated with this role, in seconds. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
| renewStatements
| java.util.List
| Database statements to execute to renew a user. |
@@ -132,7 +132,7 @@ Must be unique amongst siblings in the same scope
The path of the Database Secret Backend the role belongs to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#backend DatabaseSecretBackendRole#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#backend DatabaseSecretBackendRole#backend}
---
@@ -142,7 +142,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Database statements to execute to create and configure a user.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#creation_statements DatabaseSecretBackendRole#creation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#creation_statements DatabaseSecretBackendRole#creation_statements}
---
@@ -152,7 +152,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Database connection to use for this role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#db_name DatabaseSecretBackendRole#db_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#db_name DatabaseSecretBackendRole#db_name}
---
@@ -162,7 +162,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Unique name for the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#name DatabaseSecretBackendRole#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#name DatabaseSecretBackendRole#name}
---
@@ -172,7 +172,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Specifies the configuration for the given credential_type.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#credential_config DatabaseSecretBackendRole#credential_config}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#credential_config DatabaseSecretBackendRole#credential_config}
---
@@ -182,7 +182,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Specifies the type of credential that will be generated for the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#credential_type DatabaseSecretBackendRole#credential_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#credential_type DatabaseSecretBackendRole#credential_type}
---
@@ -192,7 +192,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Default TTL for leases associated with this role, in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#default_ttl DatabaseSecretBackendRole#default_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#default_ttl DatabaseSecretBackendRole#default_ttl}
---
@@ -200,7 +200,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#id DatabaseSecretBackendRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#id DatabaseSecretBackendRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -213,7 +213,7 @@ If you experience problems setting this value it might not be settable. Please t
Maximum TTL for leases associated with this role, in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#max_ttl DatabaseSecretBackendRole#max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#max_ttl DatabaseSecretBackendRole#max_ttl}
---
@@ -223,7 +223,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#namespace DatabaseSecretBackendRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#namespace DatabaseSecretBackendRole#namespace}
---
@@ -233,7 +233,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Database statements to execute to renew a user.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#renew_statements DatabaseSecretBackendRole#renew_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#renew_statements DatabaseSecretBackendRole#renew_statements}
---
@@ -243,7 +243,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Database statements to execute to revoke a user.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#revocation_statements DatabaseSecretBackendRole#revocation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#revocation_statements DatabaseSecretBackendRole#revocation_statements}
---
@@ -253,7 +253,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Database statements to execute to rollback a create operation in the event of an error.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#rollback_statements DatabaseSecretBackendRole#rollback_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#rollback_statements DatabaseSecretBackendRole#rollback_statements}
---
@@ -743,7 +743,7 @@ The construct id used in the generated config for the DatabaseSecretBackendRole
The id of the existing DatabaseSecretBackendRole that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#import import section} in the documentation of this resource for the id to use
---
@@ -1277,7 +1277,7 @@ DatabaseSecretBackendRoleConfig.builder()
| credentialConfig
| java.util.Map
| Specifies the configuration for the given credential_type. |
| credentialType
| java.lang.String
| Specifies the type of credential that will be generated for the role. |
| defaultTtl
| java.lang.Number
| Default TTL for leases associated with this role, in seconds. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#id DatabaseSecretBackendRole#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#id DatabaseSecretBackendRole#id}. |
| maxTtl
| java.lang.Number
| Maximum TTL for leases associated with this role, in seconds. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
| renewStatements
| java.util.List
| Database statements to execute to renew a user. |
@@ -1366,7 +1366,7 @@ public java.lang.String getBackend();
The path of the Database Secret Backend the role belongs to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#backend DatabaseSecretBackendRole#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#backend DatabaseSecretBackendRole#backend}
---
@@ -1380,7 +1380,7 @@ public java.util.List getCreationStatements();
Database statements to execute to create and configure a user.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#creation_statements DatabaseSecretBackendRole#creation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#creation_statements DatabaseSecretBackendRole#creation_statements}
---
@@ -1394,7 +1394,7 @@ public java.lang.String getDbName();
Database connection to use for this role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#db_name DatabaseSecretBackendRole#db_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#db_name DatabaseSecretBackendRole#db_name}
---
@@ -1408,7 +1408,7 @@ public java.lang.String getName();
Unique name for the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#name DatabaseSecretBackendRole#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#name DatabaseSecretBackendRole#name}
---
@@ -1422,7 +1422,7 @@ public java.util.Map getCredentialConfig();
Specifies the configuration for the given credential_type.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#credential_config DatabaseSecretBackendRole#credential_config}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#credential_config DatabaseSecretBackendRole#credential_config}
---
@@ -1436,7 +1436,7 @@ public java.lang.String getCredentialType();
Specifies the type of credential that will be generated for the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#credential_type DatabaseSecretBackendRole#credential_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#credential_type DatabaseSecretBackendRole#credential_type}
---
@@ -1450,7 +1450,7 @@ public java.lang.Number getDefaultTtl();
Default TTL for leases associated with this role, in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#default_ttl DatabaseSecretBackendRole#default_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#default_ttl DatabaseSecretBackendRole#default_ttl}
---
@@ -1462,7 +1462,7 @@ public java.lang.String getId();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#id DatabaseSecretBackendRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#id DatabaseSecretBackendRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1479,7 +1479,7 @@ public java.lang.Number getMaxTtl();
Maximum TTL for leases associated with this role, in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#max_ttl DatabaseSecretBackendRole#max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#max_ttl DatabaseSecretBackendRole#max_ttl}
---
@@ -1493,7 +1493,7 @@ public java.lang.String getNamespace();
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#namespace DatabaseSecretBackendRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#namespace DatabaseSecretBackendRole#namespace}
---
@@ -1507,7 +1507,7 @@ public java.util.List getRenewStatements();
Database statements to execute to renew a user.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#renew_statements DatabaseSecretBackendRole#renew_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#renew_statements DatabaseSecretBackendRole#renew_statements}
---
@@ -1521,7 +1521,7 @@ public java.util.List getRevocationStatements();
Database statements to execute to revoke a user.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#revocation_statements DatabaseSecretBackendRole#revocation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#revocation_statements DatabaseSecretBackendRole#revocation_statements}
---
@@ -1535,7 +1535,7 @@ public java.util.List getRollbackStatements();
Database statements to execute to rollback a create operation in the event of an error.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#rollback_statements DatabaseSecretBackendRole#rollback_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#rollback_statements DatabaseSecretBackendRole#rollback_statements}
---
diff --git a/docs/databaseSecretBackendRole.python.md b/docs/databaseSecretBackendRole.python.md
index e065df84..99e46790 100644
--- a/docs/databaseSecretBackendRole.python.md
+++ b/docs/databaseSecretBackendRole.python.md
@@ -4,7 +4,7 @@
### DatabaseSecretBackendRole
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role vault_database_secret_backend_role}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role vault_database_secret_backend_role}.
#### Initializers
@@ -55,7 +55,7 @@ databaseSecretBackendRole.DatabaseSecretBackendRole(
| credential_config
| typing.Mapping[str]
| Specifies the configuration for the given credential_type. |
| credential_type
| str
| Specifies the type of credential that will be generated for the role. |
| default_ttl
| typing.Union[int, float]
| Default TTL for leases associated with this role, in seconds. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#id DatabaseSecretBackendRole#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#id DatabaseSecretBackendRole#id}. |
| max_ttl
| typing.Union[int, float]
| Maximum TTL for leases associated with this role, in seconds. |
| namespace
| str
| Target namespace. (requires Enterprise). |
| renew_statements
| typing.List[str]
| Database statements to execute to renew a user. |
@@ -130,7 +130,7 @@ Must be unique amongst siblings in the same scope
The path of the Database Secret Backend the role belongs to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#backend DatabaseSecretBackendRole#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#backend DatabaseSecretBackendRole#backend}
---
@@ -140,7 +140,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Database statements to execute to create and configure a user.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#creation_statements DatabaseSecretBackendRole#creation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#creation_statements DatabaseSecretBackendRole#creation_statements}
---
@@ -150,7 +150,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Database connection to use for this role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#db_name DatabaseSecretBackendRole#db_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#db_name DatabaseSecretBackendRole#db_name}
---
@@ -160,7 +160,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Unique name for the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#name DatabaseSecretBackendRole#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#name DatabaseSecretBackendRole#name}
---
@@ -170,7 +170,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Specifies the configuration for the given credential_type.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#credential_config DatabaseSecretBackendRole#credential_config}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#credential_config DatabaseSecretBackendRole#credential_config}
---
@@ -180,7 +180,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Specifies the type of credential that will be generated for the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#credential_type DatabaseSecretBackendRole#credential_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#credential_type DatabaseSecretBackendRole#credential_type}
---
@@ -190,7 +190,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Default TTL for leases associated with this role, in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#default_ttl DatabaseSecretBackendRole#default_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#default_ttl DatabaseSecretBackendRole#default_ttl}
---
@@ -198,7 +198,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#id DatabaseSecretBackendRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#id DatabaseSecretBackendRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -211,7 +211,7 @@ If you experience problems setting this value it might not be settable. Please t
Maximum TTL for leases associated with this role, in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#max_ttl DatabaseSecretBackendRole#max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#max_ttl DatabaseSecretBackendRole#max_ttl}
---
@@ -221,7 +221,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#namespace DatabaseSecretBackendRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#namespace DatabaseSecretBackendRole#namespace}
---
@@ -231,7 +231,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Database statements to execute to renew a user.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#renew_statements DatabaseSecretBackendRole#renew_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#renew_statements DatabaseSecretBackendRole#renew_statements}
---
@@ -241,7 +241,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Database statements to execute to revoke a user.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#revocation_statements DatabaseSecretBackendRole#revocation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#revocation_statements DatabaseSecretBackendRole#revocation_statements}
---
@@ -251,7 +251,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Database statements to execute to rollback a create operation in the event of an error.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#rollback_statements DatabaseSecretBackendRole#rollback_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#rollback_statements DatabaseSecretBackendRole#rollback_statements}
---
@@ -787,7 +787,7 @@ The construct id used in the generated config for the DatabaseSecretBackendRole
The id of the existing DatabaseSecretBackendRole that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#import import section} in the documentation of this resource for the id to use
---
@@ -1317,7 +1317,7 @@ databaseSecretBackendRole.DatabaseSecretBackendRoleConfig(
| credential_config
| typing.Mapping[str]
| Specifies the configuration for the given credential_type. |
| credential_type
| str
| Specifies the type of credential that will be generated for the role. |
| default_ttl
| typing.Union[int, float]
| Default TTL for leases associated with this role, in seconds. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#id DatabaseSecretBackendRole#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#id DatabaseSecretBackendRole#id}. |
| max_ttl
| typing.Union[int, float]
| Maximum TTL for leases associated with this role, in seconds. |
| namespace
| str
| Target namespace. (requires Enterprise). |
| renew_statements
| typing.List[str]
| Database statements to execute to renew a user. |
@@ -1406,7 +1406,7 @@ backend: str
The path of the Database Secret Backend the role belongs to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#backend DatabaseSecretBackendRole#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#backend DatabaseSecretBackendRole#backend}
---
@@ -1420,7 +1420,7 @@ creation_statements: typing.List[str]
Database statements to execute to create and configure a user.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#creation_statements DatabaseSecretBackendRole#creation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#creation_statements DatabaseSecretBackendRole#creation_statements}
---
@@ -1434,7 +1434,7 @@ db_name: str
Database connection to use for this role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#db_name DatabaseSecretBackendRole#db_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#db_name DatabaseSecretBackendRole#db_name}
---
@@ -1448,7 +1448,7 @@ name: str
Unique name for the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#name DatabaseSecretBackendRole#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#name DatabaseSecretBackendRole#name}
---
@@ -1462,7 +1462,7 @@ credential_config: typing.Mapping[str]
Specifies the configuration for the given credential_type.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#credential_config DatabaseSecretBackendRole#credential_config}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#credential_config DatabaseSecretBackendRole#credential_config}
---
@@ -1476,7 +1476,7 @@ credential_type: str
Specifies the type of credential that will be generated for the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#credential_type DatabaseSecretBackendRole#credential_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#credential_type DatabaseSecretBackendRole#credential_type}
---
@@ -1490,7 +1490,7 @@ default_ttl: typing.Union[int, float]
Default TTL for leases associated with this role, in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#default_ttl DatabaseSecretBackendRole#default_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#default_ttl DatabaseSecretBackendRole#default_ttl}
---
@@ -1502,7 +1502,7 @@ id: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#id DatabaseSecretBackendRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#id DatabaseSecretBackendRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1519,7 +1519,7 @@ max_ttl: typing.Union[int, float]
Maximum TTL for leases associated with this role, in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#max_ttl DatabaseSecretBackendRole#max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#max_ttl DatabaseSecretBackendRole#max_ttl}
---
@@ -1533,7 +1533,7 @@ namespace: str
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#namespace DatabaseSecretBackendRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#namespace DatabaseSecretBackendRole#namespace}
---
@@ -1547,7 +1547,7 @@ renew_statements: typing.List[str]
Database statements to execute to renew a user.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#renew_statements DatabaseSecretBackendRole#renew_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#renew_statements DatabaseSecretBackendRole#renew_statements}
---
@@ -1561,7 +1561,7 @@ revocation_statements: typing.List[str]
Database statements to execute to revoke a user.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#revocation_statements DatabaseSecretBackendRole#revocation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#revocation_statements DatabaseSecretBackendRole#revocation_statements}
---
@@ -1575,7 +1575,7 @@ rollback_statements: typing.List[str]
Database statements to execute to rollback a create operation in the event of an error.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#rollback_statements DatabaseSecretBackendRole#rollback_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#rollback_statements DatabaseSecretBackendRole#rollback_statements}
---
diff --git a/docs/databaseSecretBackendRole.typescript.md b/docs/databaseSecretBackendRole.typescript.md
index 6b6459f3..6e2bd45f 100644
--- a/docs/databaseSecretBackendRole.typescript.md
+++ b/docs/databaseSecretBackendRole.typescript.md
@@ -4,7 +4,7 @@
### DatabaseSecretBackendRole
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role vault_database_secret_backend_role}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role vault_database_secret_backend_role}.
#### Initializers
@@ -530,7 +530,7 @@ The construct id used in the generated config for the DatabaseSecretBackendRole
The id of the existing DatabaseSecretBackendRole that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#import import section} in the documentation of this resource for the id to use
---
@@ -1039,7 +1039,7 @@ const databaseSecretBackendRoleConfig: databaseSecretBackendRole.DatabaseSecretB
| credentialConfig
| {[ key: string ]: string}
| Specifies the configuration for the given credential_type. |
| credentialType
| string
| Specifies the type of credential that will be generated for the role. |
| defaultTtl
| number
| Default TTL for leases associated with this role, in seconds. |
-| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#id DatabaseSecretBackendRole#id}. |
+| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#id DatabaseSecretBackendRole#id}. |
| maxTtl
| number
| Maximum TTL for leases associated with this role, in seconds. |
| namespace
| string
| Target namespace. (requires Enterprise). |
| renewStatements
| string[]
| Database statements to execute to renew a user. |
@@ -1128,7 +1128,7 @@ public readonly backend: string;
The path of the Database Secret Backend the role belongs to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#backend DatabaseSecretBackendRole#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#backend DatabaseSecretBackendRole#backend}
---
@@ -1142,7 +1142,7 @@ public readonly creationStatements: string[];
Database statements to execute to create and configure a user.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#creation_statements DatabaseSecretBackendRole#creation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#creation_statements DatabaseSecretBackendRole#creation_statements}
---
@@ -1156,7 +1156,7 @@ public readonly dbName: string;
Database connection to use for this role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#db_name DatabaseSecretBackendRole#db_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#db_name DatabaseSecretBackendRole#db_name}
---
@@ -1170,7 +1170,7 @@ public readonly name: string;
Unique name for the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#name DatabaseSecretBackendRole#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#name DatabaseSecretBackendRole#name}
---
@@ -1184,7 +1184,7 @@ public readonly credentialConfig: {[ key: string ]: string};
Specifies the configuration for the given credential_type.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#credential_config DatabaseSecretBackendRole#credential_config}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#credential_config DatabaseSecretBackendRole#credential_config}
---
@@ -1198,7 +1198,7 @@ public readonly credentialType: string;
Specifies the type of credential that will be generated for the role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#credential_type DatabaseSecretBackendRole#credential_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#credential_type DatabaseSecretBackendRole#credential_type}
---
@@ -1212,7 +1212,7 @@ public readonly defaultTtl: number;
Default TTL for leases associated with this role, in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#default_ttl DatabaseSecretBackendRole#default_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#default_ttl DatabaseSecretBackendRole#default_ttl}
---
@@ -1224,7 +1224,7 @@ public readonly id: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#id DatabaseSecretBackendRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#id DatabaseSecretBackendRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1241,7 +1241,7 @@ public readonly maxTtl: number;
Maximum TTL for leases associated with this role, in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#max_ttl DatabaseSecretBackendRole#max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#max_ttl DatabaseSecretBackendRole#max_ttl}
---
@@ -1255,7 +1255,7 @@ public readonly namespace: string;
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#namespace DatabaseSecretBackendRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#namespace DatabaseSecretBackendRole#namespace}
---
@@ -1269,7 +1269,7 @@ public readonly renewStatements: string[];
Database statements to execute to renew a user.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#renew_statements DatabaseSecretBackendRole#renew_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#renew_statements DatabaseSecretBackendRole#renew_statements}
---
@@ -1283,7 +1283,7 @@ public readonly revocationStatements: string[];
Database statements to execute to revoke a user.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#revocation_statements DatabaseSecretBackendRole#revocation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#revocation_statements DatabaseSecretBackendRole#revocation_statements}
---
@@ -1297,7 +1297,7 @@ public readonly rollbackStatements: string[];
Database statements to execute to rollback a create operation in the event of an error.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#rollback_statements DatabaseSecretBackendRole#rollback_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#rollback_statements DatabaseSecretBackendRole#rollback_statements}
---
diff --git a/docs/databaseSecretBackendStaticRole.csharp.md b/docs/databaseSecretBackendStaticRole.csharp.md
index 5cafdf7f..ed342eee 100644
--- a/docs/databaseSecretBackendStaticRole.csharp.md
+++ b/docs/databaseSecretBackendStaticRole.csharp.md
@@ -4,7 +4,7 @@
### DatabaseSecretBackendStaticRole
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role vault_database_secret_backend_static_role}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role vault_database_secret_backend_static_role}.
#### Initializers
@@ -79,6 +79,7 @@ Must be unique amongst siblings in the same scope
| ResetRotationSchedule
| *No description.* |
| ResetRotationStatements
| *No description.* |
| ResetRotationWindow
| *No description.* |
+| ResetSelfManagedPassword
| *No description.* |
---
@@ -406,6 +407,12 @@ private void ResetRotationStatements()
private void ResetRotationWindow()
```
+##### `ResetSelfManagedPassword`
+
+```csharp
+private void ResetSelfManagedPassword()
+```
+
#### Static Functions
| **Name** | **Description** |
@@ -509,7 +516,7 @@ The construct id used in the generated config for the DatabaseSecretBackendStati
The id of the existing DatabaseSecretBackendStaticRole that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#import import section} in the documentation of this resource for the id to use
---
@@ -548,6 +555,7 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.
| RotationScheduleInput
| string
| *No description.* |
| RotationStatementsInput
| string[]
| *No description.* |
| RotationWindowInput
| double
| *No description.* |
+| SelfManagedPasswordInput
| string
| *No description.* |
| UsernameInput
| string
| *No description.* |
| Backend
| string
| *No description.* |
| DbName
| string
| *No description.* |
@@ -558,6 +566,7 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.
| RotationSchedule
| string
| *No description.* |
| RotationStatements
| string[]
| *No description.* |
| RotationWindow
| double
| *No description.* |
+| SelfManagedPassword
| string
| *No description.* |
| Username
| string
| *No description.* |
---
@@ -794,6 +803,16 @@ public double RotationWindowInput { get; }
---
+##### `SelfManagedPasswordInput`Optional
+
+```csharp
+public string SelfManagedPasswordInput { get; }
+```
+
+- *Type:* string
+
+---
+
##### `UsernameInput`Optional
```csharp
@@ -894,6 +913,16 @@ public double RotationWindow { get; }
---
+##### `SelfManagedPassword`Required
+
+```csharp
+public string SelfManagedPassword { get; }
+```
+
+- *Type:* string
+
+---
+
##### `Username`Required
```csharp
@@ -948,7 +977,8 @@ new DatabaseSecretBackendStaticRoleConfig {
double RotationPeriod = null,
string RotationSchedule = null,
string[] RotationStatements = null,
- double RotationWindow = null
+ double RotationWindow = null,
+ string SelfManagedPassword = null
};
```
@@ -967,12 +997,13 @@ new DatabaseSecretBackendStaticRoleConfig {
| DbName
| string
| Database connection to use for this role. |
| Name
| string
| Unique name for the static role. |
| Username
| string
| The database username that this role corresponds to. |
-| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#id DatabaseSecretBackendStaticRole#id}. |
+| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#id DatabaseSecretBackendStaticRole#id}. |
| Namespace
| string
| Target namespace. (requires Enterprise). |
| RotationPeriod
| double
| The amount of time Vault should wait before rotating the password, in seconds. |
| RotationSchedule
| string
| A cron-style string that will define the schedule on which rotations should occur. |
| RotationStatements
| string[]
| Database statements to execute to rotate the password for the configured database user. |
| RotationWindow
| double
| The amount of time in seconds in which the rotations are allowed to occur starting from a given rotation_schedule. |
+| SelfManagedPassword
| string
| The password corresponding to the username in the database. |
---
@@ -1056,7 +1087,7 @@ public string Backend { get; set; }
The path of the Database Secret Backend the role belongs to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#backend DatabaseSecretBackendStaticRole#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#backend DatabaseSecretBackendStaticRole#backend}
---
@@ -1070,7 +1101,7 @@ public string DbName { get; set; }
Database connection to use for this role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#db_name DatabaseSecretBackendStaticRole#db_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#db_name DatabaseSecretBackendStaticRole#db_name}
---
@@ -1084,7 +1115,7 @@ public string Name { get; set; }
Unique name for the static role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#name DatabaseSecretBackendStaticRole#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#name DatabaseSecretBackendStaticRole#name}
---
@@ -1098,7 +1129,7 @@ public string Username { get; set; }
The database username that this role corresponds to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#username DatabaseSecretBackendStaticRole#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#username DatabaseSecretBackendStaticRole#username}
---
@@ -1110,7 +1141,7 @@ public string Id { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#id DatabaseSecretBackendStaticRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#id DatabaseSecretBackendStaticRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1127,7 +1158,7 @@ public string Namespace { get; set; }
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#namespace DatabaseSecretBackendStaticRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#namespace DatabaseSecretBackendStaticRole#namespace}
---
@@ -1141,7 +1172,7 @@ public double RotationPeriod { get; set; }
The amount of time Vault should wait before rotating the password, in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#rotation_period DatabaseSecretBackendStaticRole#rotation_period}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#rotation_period DatabaseSecretBackendStaticRole#rotation_period}
---
@@ -1155,7 +1186,7 @@ public string RotationSchedule { get; set; }
A cron-style string that will define the schedule on which rotations should occur.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#rotation_schedule DatabaseSecretBackendStaticRole#rotation_schedule}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#rotation_schedule DatabaseSecretBackendStaticRole#rotation_schedule}
---
@@ -1169,7 +1200,7 @@ public string[] RotationStatements { get; set; }
Database statements to execute to rotate the password for the configured database user.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#rotation_statements DatabaseSecretBackendStaticRole#rotation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#rotation_statements DatabaseSecretBackendStaticRole#rotation_statements}
---
@@ -1183,7 +1214,23 @@ public double RotationWindow { get; set; }
The amount of time in seconds in which the rotations are allowed to occur starting from a given rotation_schedule.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#rotation_window DatabaseSecretBackendStaticRole#rotation_window}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#rotation_window DatabaseSecretBackendStaticRole#rotation_window}
+
+---
+
+##### `SelfManagedPassword`Optional
+
+```csharp
+public string SelfManagedPassword { get; set; }
+```
+
+- *Type:* string
+
+The password corresponding to the username in the database.
+
+Required when using the Rootless Password Rotation workflow for static roles.
+
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#self_managed_password DatabaseSecretBackendStaticRole#self_managed_password}
---
diff --git a/docs/databaseSecretBackendStaticRole.go.md b/docs/databaseSecretBackendStaticRole.go.md
index 5c6c1b78..3e83530f 100644
--- a/docs/databaseSecretBackendStaticRole.go.md
+++ b/docs/databaseSecretBackendStaticRole.go.md
@@ -4,7 +4,7 @@
### DatabaseSecretBackendStaticRole
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role vault_database_secret_backend_static_role}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role vault_database_secret_backend_static_role}.
#### Initializers
@@ -79,6 +79,7 @@ Must be unique amongst siblings in the same scope
| ResetRotationSchedule
| *No description.* |
| ResetRotationStatements
| *No description.* |
| ResetRotationWindow
| *No description.* |
+| ResetSelfManagedPassword
| *No description.* |
---
@@ -406,6 +407,12 @@ func ResetRotationStatements()
func ResetRotationWindow()
```
+##### `ResetSelfManagedPassword`
+
+```go
+func ResetSelfManagedPassword()
+```
+
#### Static Functions
| **Name** | **Description** |
@@ -509,7 +516,7 @@ The construct id used in the generated config for the DatabaseSecretBackendStati
The id of the existing DatabaseSecretBackendStaticRole that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#import import section} in the documentation of this resource for the id to use
---
@@ -548,6 +555,7 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.
| RotationScheduleInput
| *string
| *No description.* |
| RotationStatementsInput
| *[]*string
| *No description.* |
| RotationWindowInput
| *f64
| *No description.* |
+| SelfManagedPasswordInput
| *string
| *No description.* |
| UsernameInput
| *string
| *No description.* |
| Backend
| *string
| *No description.* |
| DbName
| *string
| *No description.* |
@@ -558,6 +566,7 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.
| RotationSchedule
| *string
| *No description.* |
| RotationStatements
| *[]*string
| *No description.* |
| RotationWindow
| *f64
| *No description.* |
+| SelfManagedPassword
| *string
| *No description.* |
| Username
| *string
| *No description.* |
---
@@ -794,6 +803,16 @@ func RotationWindowInput() *f64
---
+##### `SelfManagedPasswordInput`Optional
+
+```go
+func SelfManagedPasswordInput() *string
+```
+
+- *Type:* *string
+
+---
+
##### `UsernameInput`Optional
```go
@@ -894,6 +913,16 @@ func RotationWindow() *f64
---
+##### `SelfManagedPassword`Required
+
+```go
+func SelfManagedPassword() *string
+```
+
+- *Type:* *string
+
+---
+
##### `Username`Required
```go
@@ -949,6 +978,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretbackend
RotationSchedule: *string,
RotationStatements: *[]*string,
RotationWindow: *f64,
+ SelfManagedPassword: *string,
}
```
@@ -967,12 +997,13 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretbackend
| DbName
| *string
| Database connection to use for this role. |
| Name
| *string
| Unique name for the static role. |
| Username
| *string
| The database username that this role corresponds to. |
-| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#id DatabaseSecretBackendStaticRole#id}. |
+| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#id DatabaseSecretBackendStaticRole#id}. |
| Namespace
| *string
| Target namespace. (requires Enterprise). |
| RotationPeriod
| *f64
| The amount of time Vault should wait before rotating the password, in seconds. |
| RotationSchedule
| *string
| A cron-style string that will define the schedule on which rotations should occur. |
| RotationStatements
| *[]*string
| Database statements to execute to rotate the password for the configured database user. |
| RotationWindow
| *f64
| The amount of time in seconds in which the rotations are allowed to occur starting from a given rotation_schedule. |
+| SelfManagedPassword
| *string
| The password corresponding to the username in the database. |
---
@@ -1056,7 +1087,7 @@ Backend *string
The path of the Database Secret Backend the role belongs to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#backend DatabaseSecretBackendStaticRole#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#backend DatabaseSecretBackendStaticRole#backend}
---
@@ -1070,7 +1101,7 @@ DbName *string
Database connection to use for this role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#db_name DatabaseSecretBackendStaticRole#db_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#db_name DatabaseSecretBackendStaticRole#db_name}
---
@@ -1084,7 +1115,7 @@ Name *string
Unique name for the static role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#name DatabaseSecretBackendStaticRole#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#name DatabaseSecretBackendStaticRole#name}
---
@@ -1098,7 +1129,7 @@ Username *string
The database username that this role corresponds to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#username DatabaseSecretBackendStaticRole#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#username DatabaseSecretBackendStaticRole#username}
---
@@ -1110,7 +1141,7 @@ Id *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#id DatabaseSecretBackendStaticRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#id DatabaseSecretBackendStaticRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1127,7 +1158,7 @@ Namespace *string
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#namespace DatabaseSecretBackendStaticRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#namespace DatabaseSecretBackendStaticRole#namespace}
---
@@ -1141,7 +1172,7 @@ RotationPeriod *f64
The amount of time Vault should wait before rotating the password, in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#rotation_period DatabaseSecretBackendStaticRole#rotation_period}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#rotation_period DatabaseSecretBackendStaticRole#rotation_period}
---
@@ -1155,7 +1186,7 @@ RotationSchedule *string
A cron-style string that will define the schedule on which rotations should occur.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#rotation_schedule DatabaseSecretBackendStaticRole#rotation_schedule}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#rotation_schedule DatabaseSecretBackendStaticRole#rotation_schedule}
---
@@ -1169,7 +1200,7 @@ RotationStatements *[]*string
Database statements to execute to rotate the password for the configured database user.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#rotation_statements DatabaseSecretBackendStaticRole#rotation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#rotation_statements DatabaseSecretBackendStaticRole#rotation_statements}
---
@@ -1183,7 +1214,23 @@ RotationWindow *f64
The amount of time in seconds in which the rotations are allowed to occur starting from a given rotation_schedule.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#rotation_window DatabaseSecretBackendStaticRole#rotation_window}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#rotation_window DatabaseSecretBackendStaticRole#rotation_window}
+
+---
+
+##### `SelfManagedPassword`Optional
+
+```go
+SelfManagedPassword *string
+```
+
+- *Type:* *string
+
+The password corresponding to the username in the database.
+
+Required when using the Rootless Password Rotation workflow for static roles.
+
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#self_managed_password DatabaseSecretBackendStaticRole#self_managed_password}
---
diff --git a/docs/databaseSecretBackendStaticRole.java.md b/docs/databaseSecretBackendStaticRole.java.md
index 3e07bad8..9a954ea6 100644
--- a/docs/databaseSecretBackendStaticRole.java.md
+++ b/docs/databaseSecretBackendStaticRole.java.md
@@ -4,7 +4,7 @@
### DatabaseSecretBackendStaticRole
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role vault_database_secret_backend_static_role}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role vault_database_secret_backend_static_role}.
#### Initializers
@@ -33,6 +33,7 @@ DatabaseSecretBackendStaticRole.Builder.create(Construct scope, java.lang.String
// .rotationSchedule(java.lang.String)
// .rotationStatements(java.util.List)
// .rotationWindow(java.lang.Number)
+// .selfManagedPassword(java.lang.String)
.build();
```
@@ -51,12 +52,13 @@ DatabaseSecretBackendStaticRole.Builder.create(Construct scope, java.lang.String
| dbName
| java.lang.String
| Database connection to use for this role. |
| name
| java.lang.String
| Unique name for the static role. |
| username
| java.lang.String
| The database username that this role corresponds to. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#id DatabaseSecretBackendStaticRole#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#id DatabaseSecretBackendStaticRole#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
| rotationPeriod
| java.lang.Number
| The amount of time Vault should wait before rotating the password, in seconds. |
| rotationSchedule
| java.lang.String
| A cron-style string that will define the schedule on which rotations should occur. |
| rotationStatements
| java.util.List
| Database statements to execute to rotate the password for the configured database user. |
| rotationWindow
| java.lang.Number
| The amount of time in seconds in which the rotations are allowed to occur starting from a given rotation_schedule. |
+| selfManagedPassword
| java.lang.String
| The password corresponding to the username in the database. |
---
@@ -126,7 +128,7 @@ Must be unique amongst siblings in the same scope
The path of the Database Secret Backend the role belongs to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#backend DatabaseSecretBackendStaticRole#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#backend DatabaseSecretBackendStaticRole#backend}
---
@@ -136,7 +138,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Database connection to use for this role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#db_name DatabaseSecretBackendStaticRole#db_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#db_name DatabaseSecretBackendStaticRole#db_name}
---
@@ -146,7 +148,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Unique name for the static role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#name DatabaseSecretBackendStaticRole#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#name DatabaseSecretBackendStaticRole#name}
---
@@ -156,7 +158,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The database username that this role corresponds to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#username DatabaseSecretBackendStaticRole#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#username DatabaseSecretBackendStaticRole#username}
---
@@ -164,7 +166,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#id DatabaseSecretBackendStaticRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#id DatabaseSecretBackendStaticRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -177,7 +179,7 @@ If you experience problems setting this value it might not be settable. Please t
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#namespace DatabaseSecretBackendStaticRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#namespace DatabaseSecretBackendStaticRole#namespace}
---
@@ -187,7 +189,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The amount of time Vault should wait before rotating the password, in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#rotation_period DatabaseSecretBackendStaticRole#rotation_period}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#rotation_period DatabaseSecretBackendStaticRole#rotation_period}
---
@@ -197,7 +199,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
A cron-style string that will define the schedule on which rotations should occur.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#rotation_schedule DatabaseSecretBackendStaticRole#rotation_schedule}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#rotation_schedule DatabaseSecretBackendStaticRole#rotation_schedule}
---
@@ -207,7 +209,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Database statements to execute to rotate the password for the configured database user.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#rotation_statements DatabaseSecretBackendStaticRole#rotation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#rotation_statements DatabaseSecretBackendStaticRole#rotation_statements}
---
@@ -217,7 +219,19 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The amount of time in seconds in which the rotations are allowed to occur starting from a given rotation_schedule.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#rotation_window DatabaseSecretBackendStaticRole#rotation_window}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#rotation_window DatabaseSecretBackendStaticRole#rotation_window}
+
+---
+
+##### `selfManagedPassword`Optional
+
+- *Type:* java.lang.String
+
+The password corresponding to the username in the database.
+
+Required when using the Rootless Password Rotation workflow for static roles.
+
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#self_managed_password DatabaseSecretBackendStaticRole#self_managed_password}
---
@@ -254,6 +268,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
| resetRotationSchedule
| *No description.* |
| resetRotationStatements
| *No description.* |
| resetRotationWindow
| *No description.* |
+| resetSelfManagedPassword
| *No description.* |
---
@@ -583,6 +598,12 @@ public void resetRotationStatements()
public void resetRotationWindow()
```
+##### `resetSelfManagedPassword`
+
+```java
+public void resetSelfManagedPassword()
+```
+
#### Static Functions
| **Name** | **Description** |
@@ -686,7 +707,7 @@ The construct id used in the generated config for the DatabaseSecretBackendStati
The id of the existing DatabaseSecretBackendStaticRole that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#import import section} in the documentation of this resource for the id to use
---
@@ -725,6 +746,7 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.
| rotationScheduleInput
| java.lang.String
| *No description.* |
| rotationStatementsInput
| java.util.List
| *No description.* |
| rotationWindowInput
| java.lang.Number
| *No description.* |
+| selfManagedPasswordInput
| java.lang.String
| *No description.* |
| usernameInput
| java.lang.String
| *No description.* |
| backend
| java.lang.String
| *No description.* |
| dbName
| java.lang.String
| *No description.* |
@@ -735,6 +757,7 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.
| rotationSchedule
| java.lang.String
| *No description.* |
| rotationStatements
| java.util.List
| *No description.* |
| rotationWindow
| java.lang.Number
| *No description.* |
+| selfManagedPassword
| java.lang.String
| *No description.* |
| username
| java.lang.String
| *No description.* |
---
@@ -971,6 +994,16 @@ public java.lang.Number getRotationWindowInput();
---
+##### `selfManagedPasswordInput`Optional
+
+```java
+public java.lang.String getSelfManagedPasswordInput();
+```
+
+- *Type:* java.lang.String
+
+---
+
##### `usernameInput`Optional
```java
@@ -1071,6 +1104,16 @@ public java.lang.Number getRotationWindow();
---
+##### `selfManagedPassword`Required
+
+```java
+public java.lang.String getSelfManagedPassword();
+```
+
+- *Type:* java.lang.String
+
+---
+
##### `username`Required
```java
@@ -1130,6 +1173,7 @@ DatabaseSecretBackendStaticRoleConfig.builder()
// .rotationSchedule(java.lang.String)
// .rotationStatements(java.util.List)
// .rotationWindow(java.lang.Number)
+// .selfManagedPassword(java.lang.String)
.build();
```
@@ -1148,12 +1192,13 @@ DatabaseSecretBackendStaticRoleConfig.builder()
| dbName
| java.lang.String
| Database connection to use for this role. |
| name
| java.lang.String
| Unique name for the static role. |
| username
| java.lang.String
| The database username that this role corresponds to. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#id DatabaseSecretBackendStaticRole#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#id DatabaseSecretBackendStaticRole#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
| rotationPeriod
| java.lang.Number
| The amount of time Vault should wait before rotating the password, in seconds. |
| rotationSchedule
| java.lang.String
| A cron-style string that will define the schedule on which rotations should occur. |
| rotationStatements
| java.util.List
| Database statements to execute to rotate the password for the configured database user. |
| rotationWindow
| java.lang.Number
| The amount of time in seconds in which the rotations are allowed to occur starting from a given rotation_schedule. |
+| selfManagedPassword
| java.lang.String
| The password corresponding to the username in the database. |
---
@@ -1237,7 +1282,7 @@ public java.lang.String getBackend();
The path of the Database Secret Backend the role belongs to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#backend DatabaseSecretBackendStaticRole#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#backend DatabaseSecretBackendStaticRole#backend}
---
@@ -1251,7 +1296,7 @@ public java.lang.String getDbName();
Database connection to use for this role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#db_name DatabaseSecretBackendStaticRole#db_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#db_name DatabaseSecretBackendStaticRole#db_name}
---
@@ -1265,7 +1310,7 @@ public java.lang.String getName();
Unique name for the static role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#name DatabaseSecretBackendStaticRole#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#name DatabaseSecretBackendStaticRole#name}
---
@@ -1279,7 +1324,7 @@ public java.lang.String getUsername();
The database username that this role corresponds to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#username DatabaseSecretBackendStaticRole#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#username DatabaseSecretBackendStaticRole#username}
---
@@ -1291,7 +1336,7 @@ public java.lang.String getId();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#id DatabaseSecretBackendStaticRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#id DatabaseSecretBackendStaticRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1308,7 +1353,7 @@ public java.lang.String getNamespace();
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#namespace DatabaseSecretBackendStaticRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#namespace DatabaseSecretBackendStaticRole#namespace}
---
@@ -1322,7 +1367,7 @@ public java.lang.Number getRotationPeriod();
The amount of time Vault should wait before rotating the password, in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#rotation_period DatabaseSecretBackendStaticRole#rotation_period}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#rotation_period DatabaseSecretBackendStaticRole#rotation_period}
---
@@ -1336,7 +1381,7 @@ public java.lang.String getRotationSchedule();
A cron-style string that will define the schedule on which rotations should occur.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#rotation_schedule DatabaseSecretBackendStaticRole#rotation_schedule}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#rotation_schedule DatabaseSecretBackendStaticRole#rotation_schedule}
---
@@ -1350,7 +1395,7 @@ public java.util.List getRotationStatements();
Database statements to execute to rotate the password for the configured database user.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#rotation_statements DatabaseSecretBackendStaticRole#rotation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#rotation_statements DatabaseSecretBackendStaticRole#rotation_statements}
---
@@ -1364,7 +1409,23 @@ public java.lang.Number getRotationWindow();
The amount of time in seconds in which the rotations are allowed to occur starting from a given rotation_schedule.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#rotation_window DatabaseSecretBackendStaticRole#rotation_window}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#rotation_window DatabaseSecretBackendStaticRole#rotation_window}
+
+---
+
+##### `selfManagedPassword`Optional
+
+```java
+public java.lang.String getSelfManagedPassword();
+```
+
+- *Type:* java.lang.String
+
+The password corresponding to the username in the database.
+
+Required when using the Rootless Password Rotation workflow for static roles.
+
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#self_managed_password DatabaseSecretBackendStaticRole#self_managed_password}
---
diff --git a/docs/databaseSecretBackendStaticRole.python.md b/docs/databaseSecretBackendStaticRole.python.md
index b96df3d1..6a43704f 100644
--- a/docs/databaseSecretBackendStaticRole.python.md
+++ b/docs/databaseSecretBackendStaticRole.python.md
@@ -4,7 +4,7 @@
### DatabaseSecretBackendStaticRole
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role vault_database_secret_backend_static_role}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role vault_database_secret_backend_static_role}.
#### Initializers
@@ -30,7 +30,8 @@ databaseSecretBackendStaticRole.DatabaseSecretBackendStaticRole(
rotation_period: typing.Union[int, float] = None,
rotation_schedule: str = None,
rotation_statements: typing.List[str] = None,
- rotation_window: typing.Union[int, float] = None
+ rotation_window: typing.Union[int, float] = None,
+ self_managed_password: str = None
)
```
@@ -49,12 +50,13 @@ databaseSecretBackendStaticRole.DatabaseSecretBackendStaticRole(
| db_name
| str
| Database connection to use for this role. |
| name
| str
| Unique name for the static role. |
| username
| str
| The database username that this role corresponds to. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#id DatabaseSecretBackendStaticRole#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#id DatabaseSecretBackendStaticRole#id}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
| rotation_period
| typing.Union[int, float]
| The amount of time Vault should wait before rotating the password, in seconds. |
| rotation_schedule
| str
| A cron-style string that will define the schedule on which rotations should occur. |
| rotation_statements
| typing.List[str]
| Database statements to execute to rotate the password for the configured database user. |
| rotation_window
| typing.Union[int, float]
| The amount of time in seconds in which the rotations are allowed to occur starting from a given rotation_schedule. |
+| self_managed_password
| str
| The password corresponding to the username in the database. |
---
@@ -124,7 +126,7 @@ Must be unique amongst siblings in the same scope
The path of the Database Secret Backend the role belongs to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#backend DatabaseSecretBackendStaticRole#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#backend DatabaseSecretBackendStaticRole#backend}
---
@@ -134,7 +136,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Database connection to use for this role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#db_name DatabaseSecretBackendStaticRole#db_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#db_name DatabaseSecretBackendStaticRole#db_name}
---
@@ -144,7 +146,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Unique name for the static role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#name DatabaseSecretBackendStaticRole#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#name DatabaseSecretBackendStaticRole#name}
---
@@ -154,7 +156,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The database username that this role corresponds to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#username DatabaseSecretBackendStaticRole#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#username DatabaseSecretBackendStaticRole#username}
---
@@ -162,7 +164,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#id DatabaseSecretBackendStaticRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#id DatabaseSecretBackendStaticRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -175,7 +177,7 @@ If you experience problems setting this value it might not be settable. Please t
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#namespace DatabaseSecretBackendStaticRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#namespace DatabaseSecretBackendStaticRole#namespace}
---
@@ -185,7 +187,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The amount of time Vault should wait before rotating the password, in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#rotation_period DatabaseSecretBackendStaticRole#rotation_period}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#rotation_period DatabaseSecretBackendStaticRole#rotation_period}
---
@@ -195,7 +197,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
A cron-style string that will define the schedule on which rotations should occur.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#rotation_schedule DatabaseSecretBackendStaticRole#rotation_schedule}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#rotation_schedule DatabaseSecretBackendStaticRole#rotation_schedule}
---
@@ -205,7 +207,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Database statements to execute to rotate the password for the configured database user.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#rotation_statements DatabaseSecretBackendStaticRole#rotation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#rotation_statements DatabaseSecretBackendStaticRole#rotation_statements}
---
@@ -215,7 +217,19 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The amount of time in seconds in which the rotations are allowed to occur starting from a given rotation_schedule.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#rotation_window DatabaseSecretBackendStaticRole#rotation_window}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#rotation_window DatabaseSecretBackendStaticRole#rotation_window}
+
+---
+
+##### `self_managed_password`Optional
+
+- *Type:* str
+
+The password corresponding to the username in the database.
+
+Required when using the Rootless Password Rotation workflow for static roles.
+
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#self_managed_password DatabaseSecretBackendStaticRole#self_managed_password}
---
@@ -252,6 +266,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
| reset_rotation_schedule
| *No description.* |
| reset_rotation_statements
| *No description.* |
| reset_rotation_window
| *No description.* |
+| reset_self_managed_password
| *No description.* |
---
@@ -616,6 +631,12 @@ def reset_rotation_statements() -> None
def reset_rotation_window() -> None
```
+##### `reset_self_managed_password`
+
+```python
+def reset_self_managed_password() -> None
+```
+
#### Static Functions
| **Name** | **Description** |
@@ -730,7 +751,7 @@ The construct id used in the generated config for the DatabaseSecretBackendStati
The id of the existing DatabaseSecretBackendStaticRole that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#import import section} in the documentation of this resource for the id to use
---
@@ -769,6 +790,7 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.
| rotation_schedule_input
| str
| *No description.* |
| rotation_statements_input
| typing.List[str]
| *No description.* |
| rotation_window_input
| typing.Union[int, float]
| *No description.* |
+| self_managed_password_input
| str
| *No description.* |
| username_input
| str
| *No description.* |
| backend
| str
| *No description.* |
| db_name
| str
| *No description.* |
@@ -779,6 +801,7 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.
| rotation_schedule
| str
| *No description.* |
| rotation_statements
| typing.List[str]
| *No description.* |
| rotation_window
| typing.Union[int, float]
| *No description.* |
+| self_managed_password
| str
| *No description.* |
| username
| str
| *No description.* |
---
@@ -1015,6 +1038,16 @@ rotation_window_input: typing.Union[int, float]
---
+##### `self_managed_password_input`Optional
+
+```python
+self_managed_password_input: str
+```
+
+- *Type:* str
+
+---
+
##### `username_input`Optional
```python
@@ -1115,6 +1148,16 @@ rotation_window: typing.Union[int, float]
---
+##### `self_managed_password`Required
+
+```python
+self_managed_password: str
+```
+
+- *Type:* str
+
+---
+
##### `username`Required
```python
@@ -1169,7 +1212,8 @@ databaseSecretBackendStaticRole.DatabaseSecretBackendStaticRoleConfig(
rotation_period: typing.Union[int, float] = None,
rotation_schedule: str = None,
rotation_statements: typing.List[str] = None,
- rotation_window: typing.Union[int, float] = None
+ rotation_window: typing.Union[int, float] = None,
+ self_managed_password: str = None
)
```
@@ -1188,12 +1232,13 @@ databaseSecretBackendStaticRole.DatabaseSecretBackendStaticRoleConfig(
| db_name
| str
| Database connection to use for this role. |
| name
| str
| Unique name for the static role. |
| username
| str
| The database username that this role corresponds to. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#id DatabaseSecretBackendStaticRole#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#id DatabaseSecretBackendStaticRole#id}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
| rotation_period
| typing.Union[int, float]
| The amount of time Vault should wait before rotating the password, in seconds. |
| rotation_schedule
| str
| A cron-style string that will define the schedule on which rotations should occur. |
| rotation_statements
| typing.List[str]
| Database statements to execute to rotate the password for the configured database user. |
| rotation_window
| typing.Union[int, float]
| The amount of time in seconds in which the rotations are allowed to occur starting from a given rotation_schedule. |
+| self_managed_password
| str
| The password corresponding to the username in the database. |
---
@@ -1277,7 +1322,7 @@ backend: str
The path of the Database Secret Backend the role belongs to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#backend DatabaseSecretBackendStaticRole#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#backend DatabaseSecretBackendStaticRole#backend}
---
@@ -1291,7 +1336,7 @@ db_name: str
Database connection to use for this role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#db_name DatabaseSecretBackendStaticRole#db_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#db_name DatabaseSecretBackendStaticRole#db_name}
---
@@ -1305,7 +1350,7 @@ name: str
Unique name for the static role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#name DatabaseSecretBackendStaticRole#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#name DatabaseSecretBackendStaticRole#name}
---
@@ -1319,7 +1364,7 @@ username: str
The database username that this role corresponds to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#username DatabaseSecretBackendStaticRole#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#username DatabaseSecretBackendStaticRole#username}
---
@@ -1331,7 +1376,7 @@ id: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#id DatabaseSecretBackendStaticRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#id DatabaseSecretBackendStaticRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1348,7 +1393,7 @@ namespace: str
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#namespace DatabaseSecretBackendStaticRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#namespace DatabaseSecretBackendStaticRole#namespace}
---
@@ -1362,7 +1407,7 @@ rotation_period: typing.Union[int, float]
The amount of time Vault should wait before rotating the password, in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#rotation_period DatabaseSecretBackendStaticRole#rotation_period}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#rotation_period DatabaseSecretBackendStaticRole#rotation_period}
---
@@ -1376,7 +1421,7 @@ rotation_schedule: str
A cron-style string that will define the schedule on which rotations should occur.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#rotation_schedule DatabaseSecretBackendStaticRole#rotation_schedule}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#rotation_schedule DatabaseSecretBackendStaticRole#rotation_schedule}
---
@@ -1390,7 +1435,7 @@ rotation_statements: typing.List[str]
Database statements to execute to rotate the password for the configured database user.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#rotation_statements DatabaseSecretBackendStaticRole#rotation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#rotation_statements DatabaseSecretBackendStaticRole#rotation_statements}
---
@@ -1404,7 +1449,23 @@ rotation_window: typing.Union[int, float]
The amount of time in seconds in which the rotations are allowed to occur starting from a given rotation_schedule.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#rotation_window DatabaseSecretBackendStaticRole#rotation_window}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#rotation_window DatabaseSecretBackendStaticRole#rotation_window}
+
+---
+
+##### `self_managed_password`Optional
+
+```python
+self_managed_password: str
+```
+
+- *Type:* str
+
+The password corresponding to the username in the database.
+
+Required when using the Rootless Password Rotation workflow for static roles.
+
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#self_managed_password DatabaseSecretBackendStaticRole#self_managed_password}
---
diff --git a/docs/databaseSecretBackendStaticRole.typescript.md b/docs/databaseSecretBackendStaticRole.typescript.md
index d269dab5..32348b02 100644
--- a/docs/databaseSecretBackendStaticRole.typescript.md
+++ b/docs/databaseSecretBackendStaticRole.typescript.md
@@ -4,7 +4,7 @@
### DatabaseSecretBackendStaticRole
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role vault_database_secret_backend_static_role}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role vault_database_secret_backend_static_role}.
#### Initializers
@@ -79,6 +79,7 @@ Must be unique amongst siblings in the same scope
| resetRotationSchedule
| *No description.* |
| resetRotationStatements
| *No description.* |
| resetRotationWindow
| *No description.* |
+| resetSelfManagedPassword
| *No description.* |
---
@@ -406,6 +407,12 @@ public resetRotationStatements(): void
public resetRotationWindow(): void
```
+##### `resetSelfManagedPassword`
+
+```typescript
+public resetSelfManagedPassword(): void
+```
+
#### Static Functions
| **Name** | **Description** |
@@ -509,7 +516,7 @@ The construct id used in the generated config for the DatabaseSecretBackendStati
The id of the existing DatabaseSecretBackendStaticRole that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#import import section} in the documentation of this resource for the id to use
---
@@ -548,6 +555,7 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.
| rotationScheduleInput
| string
| *No description.* |
| rotationStatementsInput
| string[]
| *No description.* |
| rotationWindowInput
| number
| *No description.* |
+| selfManagedPasswordInput
| string
| *No description.* |
| usernameInput
| string
| *No description.* |
| backend
| string
| *No description.* |
| dbName
| string
| *No description.* |
@@ -558,6 +566,7 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.
| rotationSchedule
| string
| *No description.* |
| rotationStatements
| string[]
| *No description.* |
| rotationWindow
| number
| *No description.* |
+| selfManagedPassword
| string
| *No description.* |
| username
| string
| *No description.* |
---
@@ -794,6 +803,16 @@ public readonly rotationWindowInput: number;
---
+##### `selfManagedPasswordInput`Optional
+
+```typescript
+public readonly selfManagedPasswordInput: string;
+```
+
+- *Type:* string
+
+---
+
##### `usernameInput`Optional
```typescript
@@ -894,6 +913,16 @@ public readonly rotationWindow: number;
---
+##### `selfManagedPassword`Required
+
+```typescript
+public readonly selfManagedPassword: string;
+```
+
+- *Type:* string
+
+---
+
##### `username`Required
```typescript
@@ -949,12 +978,13 @@ const databaseSecretBackendStaticRoleConfig: databaseSecretBackendStaticRole.Dat
| dbName
| string
| Database connection to use for this role. |
| name
| string
| Unique name for the static role. |
| username
| string
| The database username that this role corresponds to. |
-| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#id DatabaseSecretBackendStaticRole#id}. |
+| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#id DatabaseSecretBackendStaticRole#id}. |
| namespace
| string
| Target namespace. (requires Enterprise). |
| rotationPeriod
| number
| The amount of time Vault should wait before rotating the password, in seconds. |
| rotationSchedule
| string
| A cron-style string that will define the schedule on which rotations should occur. |
| rotationStatements
| string[]
| Database statements to execute to rotate the password for the configured database user. |
| rotationWindow
| number
| The amount of time in seconds in which the rotations are allowed to occur starting from a given rotation_schedule. |
+| selfManagedPassword
| string
| The password corresponding to the username in the database. |
---
@@ -1038,7 +1068,7 @@ public readonly backend: string;
The path of the Database Secret Backend the role belongs to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#backend DatabaseSecretBackendStaticRole#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#backend DatabaseSecretBackendStaticRole#backend}
---
@@ -1052,7 +1082,7 @@ public readonly dbName: string;
Database connection to use for this role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#db_name DatabaseSecretBackendStaticRole#db_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#db_name DatabaseSecretBackendStaticRole#db_name}
---
@@ -1066,7 +1096,7 @@ public readonly name: string;
Unique name for the static role.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#name DatabaseSecretBackendStaticRole#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#name DatabaseSecretBackendStaticRole#name}
---
@@ -1080,7 +1110,7 @@ public readonly username: string;
The database username that this role corresponds to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#username DatabaseSecretBackendStaticRole#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#username DatabaseSecretBackendStaticRole#username}
---
@@ -1092,7 +1122,7 @@ public readonly id: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#id DatabaseSecretBackendStaticRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#id DatabaseSecretBackendStaticRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1109,7 +1139,7 @@ public readonly namespace: string;
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#namespace DatabaseSecretBackendStaticRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#namespace DatabaseSecretBackendStaticRole#namespace}
---
@@ -1123,7 +1153,7 @@ public readonly rotationPeriod: number;
The amount of time Vault should wait before rotating the password, in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#rotation_period DatabaseSecretBackendStaticRole#rotation_period}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#rotation_period DatabaseSecretBackendStaticRole#rotation_period}
---
@@ -1137,7 +1167,7 @@ public readonly rotationSchedule: string;
A cron-style string that will define the schedule on which rotations should occur.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#rotation_schedule DatabaseSecretBackendStaticRole#rotation_schedule}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#rotation_schedule DatabaseSecretBackendStaticRole#rotation_schedule}
---
@@ -1151,7 +1181,7 @@ public readonly rotationStatements: string[];
Database statements to execute to rotate the password for the configured database user.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#rotation_statements DatabaseSecretBackendStaticRole#rotation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#rotation_statements DatabaseSecretBackendStaticRole#rotation_statements}
---
@@ -1165,7 +1195,23 @@ public readonly rotationWindow: number;
The amount of time in seconds in which the rotations are allowed to occur starting from a given rotation_schedule.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#rotation_window DatabaseSecretBackendStaticRole#rotation_window}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#rotation_window DatabaseSecretBackendStaticRole#rotation_window}
+
+---
+
+##### `selfManagedPassword`Optional
+
+```typescript
+public readonly selfManagedPassword: string;
+```
+
+- *Type:* string
+
+The password corresponding to the username in the database.
+
+Required when using the Rootless Password Rotation workflow for static roles.
+
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#self_managed_password DatabaseSecretBackendStaticRole#self_managed_password}
---
diff --git a/docs/databaseSecretsMount.csharp.md b/docs/databaseSecretsMount.csharp.md
index ec01d51b..3d8e3aaf 100644
--- a/docs/databaseSecretsMount.csharp.md
+++ b/docs/databaseSecretsMount.csharp.md
@@ -4,7 +4,7 @@
### DatabaseSecretsMount
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount vault_database_secrets_mount}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount vault_database_secrets_mount}.
#### Initializers
@@ -953,7 +953,7 @@ The construct id used in the generated config for the DatabaseSecretsMount to im
The id of the existing DatabaseSecretsMount that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#import import section} in the documentation of this resource for the id to use
---
@@ -2005,6 +2005,7 @@ new DatabaseSecretsMountCassandra {
double Port = null,
double ProtocolVersion = null,
string[] RootRotationStatements = null,
+ object SkipVerification = null,
object Tls = null,
string Username = null,
object VerifyConnection = null
@@ -2028,6 +2029,7 @@ new DatabaseSecretsMountCassandra {
| Port
| double
| The transport port to use to connect to Cassandra. |
| ProtocolVersion
| double
| The CQL protocol version to use. |
| RootRotationStatements
| string[]
| A list of database statements to be executed to rotate the root user's credentials. |
+| SkipVerification
| object
| Skip permissions checks when a connection to Cassandra is first created. |
| Tls
| object
| Whether to use TLS when connecting to Cassandra. |
| Username
| string
| The username to use when authenticating with Cassandra. |
| VerifyConnection
| object
| Specifies if the connection is verified during initial configuration. |
@@ -2044,7 +2046,7 @@ public string Name { get; set; }
Name of the database connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
---
@@ -2058,7 +2060,7 @@ public string[] AllowedRoles { get; set; }
A list of roles that are allowed to use this connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
---
@@ -2072,7 +2074,7 @@ public double ConnectTimeout { get; set; }
The number of seconds to use as a connection timeout.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connect_timeout DatabaseSecretsMount#connect_timeout}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connect_timeout DatabaseSecretsMount#connect_timeout}
---
@@ -2086,7 +2088,7 @@ public System.Collections.Generic.IDictionary Data { get; set; }
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
---
@@ -2100,7 +2102,7 @@ public string[] Hosts { get; set; }
Cassandra hosts to connect to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#hosts DatabaseSecretsMount#hosts}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#hosts DatabaseSecretsMount#hosts}
---
@@ -2114,7 +2116,7 @@ public object InsecureTls { get; set; }
Whether to skip verification of the server certificate when using TLS.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls}
---
@@ -2128,7 +2130,7 @@ public string Password { get; set; }
The password to use when authenticating with Cassandra.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
---
@@ -2144,7 +2146,7 @@ Concatenated PEM blocks containing a certificate and private key;
a certificate, private key, and issuing CA certificate; or just a CA certificate.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#pem_bundle DatabaseSecretsMount#pem_bundle}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#pem_bundle DatabaseSecretsMount#pem_bundle}
---
@@ -2160,7 +2162,7 @@ Specifies JSON containing a certificate and private key;
a certificate, private key, and issuing CA certificate; or just a CA certificate.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#pem_json DatabaseSecretsMount#pem_json}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#pem_json DatabaseSecretsMount#pem_json}
---
@@ -2176,7 +2178,7 @@ Specifies the name of the plugin to use for this connection.
Must be prefixed with the name of one of the supported database engine types.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
---
@@ -2190,7 +2192,7 @@ public double Port { get; set; }
The transport port to use to connect to Cassandra.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#port DatabaseSecretsMount#port}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#port DatabaseSecretsMount#port}
---
@@ -2204,7 +2206,7 @@ public double ProtocolVersion { get; set; }
The CQL protocol version to use.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#protocol_version DatabaseSecretsMount#protocol_version}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#protocol_version DatabaseSecretsMount#protocol_version}
---
@@ -2218,7 +2220,23 @@ public string[] RootRotationStatements { get; set; }
A list of database statements to be executed to rotate the root user's credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
+
+---
+
+##### `SkipVerification`Optional
+
+```csharp
+public object SkipVerification { get; set; }
+```
+
+- *Type:* object
+
+Skip permissions checks when a connection to Cassandra is first created.
+
+These checks ensure that Vault is able to create roles, but can be resource intensive in clusters with many roles.
+
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#skip_verification DatabaseSecretsMount#skip_verification}
---
@@ -2232,7 +2250,7 @@ public object Tls { get; set; }
Whether to use TLS when connecting to Cassandra.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls}
---
@@ -2246,7 +2264,7 @@ public string Username { get; set; }
The username to use when authenticating with Cassandra.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
---
@@ -2260,7 +2278,7 @@ public object VerifyConnection { get; set; }
Specifies if the connection is verified during initial configuration.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
---
@@ -2343,7 +2361,7 @@ new DatabaseSecretsMountConfig {
| Elasticsearch
| object
| elasticsearch block. |
| ExternalEntropyAccess
| object
| Enable the secrets engine to access Vault's external entropy source. |
| Hana
| object
| hana block. |
-| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#id DatabaseSecretsMount#id}. |
+| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#id DatabaseSecretsMount#id}. |
| IdentityTokenKey
| string
| The key to use for signing plugin workload identity tokens. |
| Influxdb
| object
| influxdb block. |
| ListingVisibility
| string
| Specifies whether to show this mount in the UI-specific listing endpoint. |
@@ -2450,7 +2468,7 @@ public string Path { get; set; }
Where the secret backend will be mounted.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#path DatabaseSecretsMount#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#path DatabaseSecretsMount#path}
---
@@ -2464,7 +2482,7 @@ public string[] AllowedManagedKeys { get; set; }
List of managed key registry entry names that the mount in question is allowed to access.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_managed_keys DatabaseSecretsMount#allowed_managed_keys}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_managed_keys DatabaseSecretsMount#allowed_managed_keys}
---
@@ -2478,7 +2496,7 @@ public string[] AllowedResponseHeaders { get; set; }
List of headers to allow and pass from the request to the plugin.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_response_headers DatabaseSecretsMount#allowed_response_headers}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_response_headers DatabaseSecretsMount#allowed_response_headers}
---
@@ -2492,7 +2510,7 @@ public string[] AuditNonHmacRequestKeys { get; set; }
Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#audit_non_hmac_request_keys DatabaseSecretsMount#audit_non_hmac_request_keys}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#audit_non_hmac_request_keys DatabaseSecretsMount#audit_non_hmac_request_keys}
---
@@ -2506,7 +2524,7 @@ public string[] AuditNonHmacResponseKeys { get; set; }
Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#audit_non_hmac_response_keys DatabaseSecretsMount#audit_non_hmac_response_keys}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#audit_non_hmac_response_keys DatabaseSecretsMount#audit_non_hmac_response_keys}
---
@@ -2520,7 +2538,7 @@ public object Cassandra { get; set; }
cassandra block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#cassandra DatabaseSecretsMount#cassandra}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#cassandra DatabaseSecretsMount#cassandra}
---
@@ -2534,7 +2552,7 @@ public object Couchbase { get; set; }
couchbase block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#couchbase DatabaseSecretsMount#couchbase}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#couchbase DatabaseSecretsMount#couchbase}
---
@@ -2548,7 +2566,7 @@ public double DefaultLeaseTtlSeconds { get; set; }
Default lease duration for tokens and secrets in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#default_lease_ttl_seconds DatabaseSecretsMount#default_lease_ttl_seconds}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#default_lease_ttl_seconds DatabaseSecretsMount#default_lease_ttl_seconds}
---
@@ -2562,7 +2580,7 @@ public string[] DelegatedAuthAccessors { get; set; }
List of headers to allow and pass from the request to the plugin.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#delegated_auth_accessors DatabaseSecretsMount#delegated_auth_accessors}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#delegated_auth_accessors DatabaseSecretsMount#delegated_auth_accessors}
---
@@ -2576,7 +2594,7 @@ public string Description { get; set; }
Human-friendly description of the mount.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#description DatabaseSecretsMount#description}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#description DatabaseSecretsMount#description}
---
@@ -2590,7 +2608,7 @@ public object Elasticsearch { get; set; }
elasticsearch block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#elasticsearch DatabaseSecretsMount#elasticsearch}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#elasticsearch DatabaseSecretsMount#elasticsearch}
---
@@ -2604,7 +2622,7 @@ public object ExternalEntropyAccess { get; set; }
Enable the secrets engine to access Vault's external entropy source.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#external_entropy_access DatabaseSecretsMount#external_entropy_access}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#external_entropy_access DatabaseSecretsMount#external_entropy_access}
---
@@ -2618,7 +2636,7 @@ public object Hana { get; set; }
hana block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#hana DatabaseSecretsMount#hana}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#hana DatabaseSecretsMount#hana}
---
@@ -2630,7 +2648,7 @@ public string Id { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#id DatabaseSecretsMount#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#id DatabaseSecretsMount#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -2647,7 +2665,7 @@ public string IdentityTokenKey { get; set; }
The key to use for signing plugin workload identity tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#identity_token_key DatabaseSecretsMount#identity_token_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#identity_token_key DatabaseSecretsMount#identity_token_key}
---
@@ -2661,7 +2679,7 @@ public object Influxdb { get; set; }
influxdb block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#influxdb DatabaseSecretsMount#influxdb}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#influxdb DatabaseSecretsMount#influxdb}
---
@@ -2675,7 +2693,7 @@ public string ListingVisibility { get; set; }
Specifies whether to show this mount in the UI-specific listing endpoint.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#listing_visibility DatabaseSecretsMount#listing_visibility}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#listing_visibility DatabaseSecretsMount#listing_visibility}
---
@@ -2689,7 +2707,7 @@ public object Local { get; set; }
Local mount flag that can be explicitly set to true to enforce local mount in HA environment.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#local DatabaseSecretsMount#local}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#local DatabaseSecretsMount#local}
---
@@ -2703,7 +2721,7 @@ public double MaxLeaseTtlSeconds { get; set; }
Maximum possible lease duration for tokens and secrets in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_lease_ttl_seconds DatabaseSecretsMount#max_lease_ttl_seconds}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_lease_ttl_seconds DatabaseSecretsMount#max_lease_ttl_seconds}
---
@@ -2717,7 +2735,7 @@ public object Mongodb { get; set; }
mongodb block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#mongodb DatabaseSecretsMount#mongodb}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#mongodb DatabaseSecretsMount#mongodb}
---
@@ -2731,7 +2749,7 @@ public object Mongodbatlas { get; set; }
mongodbatlas block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#mongodbatlas DatabaseSecretsMount#mongodbatlas}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#mongodbatlas DatabaseSecretsMount#mongodbatlas}
---
@@ -2745,7 +2763,7 @@ public object Mssql { get; set; }
mssql block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#mssql DatabaseSecretsMount#mssql}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#mssql DatabaseSecretsMount#mssql}
---
@@ -2759,7 +2777,7 @@ public object Mysql { get; set; }
mysql block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#mysql DatabaseSecretsMount#mysql}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#mysql DatabaseSecretsMount#mysql}
---
@@ -2773,7 +2791,7 @@ public object MysqlAurora { get; set; }
mysql_aurora block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#mysql_aurora DatabaseSecretsMount#mysql_aurora}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#mysql_aurora DatabaseSecretsMount#mysql_aurora}
---
@@ -2787,7 +2805,7 @@ public object MysqlLegacy { get; set; }
mysql_legacy block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#mysql_legacy DatabaseSecretsMount#mysql_legacy}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#mysql_legacy DatabaseSecretsMount#mysql_legacy}
---
@@ -2801,7 +2819,7 @@ public object MysqlRds { get; set; }
mysql_rds block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#mysql_rds DatabaseSecretsMount#mysql_rds}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#mysql_rds DatabaseSecretsMount#mysql_rds}
---
@@ -2815,7 +2833,7 @@ public string Namespace { get; set; }
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#namespace DatabaseSecretsMount#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#namespace DatabaseSecretsMount#namespace}
---
@@ -2829,7 +2847,7 @@ public System.Collections.Generic.IDictionary Options { get; set
Specifies mount type specific options that are passed to the backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#options DatabaseSecretsMount#options}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#options DatabaseSecretsMount#options}
---
@@ -2843,7 +2861,7 @@ public object Oracle { get; set; }
oracle block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#oracle DatabaseSecretsMount#oracle}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#oracle DatabaseSecretsMount#oracle}
---
@@ -2857,7 +2875,7 @@ public string[] PassthroughRequestHeaders { get; set; }
List of headers to allow and pass from the request to the plugin.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#passthrough_request_headers DatabaseSecretsMount#passthrough_request_headers}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#passthrough_request_headers DatabaseSecretsMount#passthrough_request_headers}
---
@@ -2871,7 +2889,7 @@ public string PluginVersion { get; set; }
Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_version DatabaseSecretsMount#plugin_version}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_version DatabaseSecretsMount#plugin_version}
---
@@ -2885,7 +2903,7 @@ public object Postgresql { get; set; }
postgresql block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#postgresql DatabaseSecretsMount#postgresql}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#postgresql DatabaseSecretsMount#postgresql}
---
@@ -2899,7 +2917,7 @@ public object Redis { get; set; }
redis block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#redis DatabaseSecretsMount#redis}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#redis DatabaseSecretsMount#redis}
---
@@ -2913,7 +2931,7 @@ public object RedisElasticache { get; set; }
redis_elasticache block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#redis_elasticache DatabaseSecretsMount#redis_elasticache}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#redis_elasticache DatabaseSecretsMount#redis_elasticache}
---
@@ -2927,7 +2945,7 @@ public object Redshift { get; set; }
redshift block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#redshift DatabaseSecretsMount#redshift}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#redshift DatabaseSecretsMount#redshift}
---
@@ -2941,7 +2959,7 @@ public object SealWrap { get; set; }
Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#seal_wrap DatabaseSecretsMount#seal_wrap}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#seal_wrap DatabaseSecretsMount#seal_wrap}
---
@@ -2955,7 +2973,7 @@ public object Snowflake { get; set; }
snowflake block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#snowflake DatabaseSecretsMount#snowflake}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#snowflake DatabaseSecretsMount#snowflake}
---
@@ -3015,7 +3033,7 @@ public string[] Hosts { get; set; }
A set of Couchbase URIs to connect to. Must use `couchbases://` scheme if `tls` is `true`.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#hosts DatabaseSecretsMount#hosts}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#hosts DatabaseSecretsMount#hosts}
---
@@ -3029,7 +3047,7 @@ public string Name { get; set; }
Name of the database connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
---
@@ -3043,7 +3061,7 @@ public string Password { get; set; }
Specifies the password corresponding to the given username.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
---
@@ -3057,7 +3075,7 @@ public string Username { get; set; }
Specifies the username for Vault to use.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
---
@@ -3071,7 +3089,7 @@ public string[] AllowedRoles { get; set; }
A list of roles that are allowed to use this connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
---
@@ -3087,7 +3105,7 @@ Required if `tls` is `true`.
Specifies the certificate authority of the Couchbase server, as a PEM certificate that has been base64 encoded.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#base64_pem DatabaseSecretsMount#base64_pem}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#base64_pem DatabaseSecretsMount#base64_pem}
---
@@ -3101,7 +3119,7 @@ public string BucketName { get; set; }
Required for Couchbase versions prior to 6.5.0. This is only used to verify vault's connection to the server.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#bucket_name DatabaseSecretsMount#bucket_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#bucket_name DatabaseSecretsMount#bucket_name}
---
@@ -3115,7 +3133,7 @@ public System.Collections.Generic.IDictionary Data { get; set; }
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
---
@@ -3129,7 +3147,7 @@ public object InsecureTls { get; set; }
Specifies whether to skip verification of the server certificate when using TLS.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls}
---
@@ -3145,7 +3163,7 @@ Specifies the name of the plugin to use for this connection.
Must be prefixed with the name of one of the supported database engine types.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
---
@@ -3159,7 +3177,7 @@ public string[] RootRotationStatements { get; set; }
A list of database statements to be executed to rotate the root user's credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
---
@@ -3173,7 +3191,7 @@ public object Tls { get; set; }
Specifies whether to use TLS when connecting to Couchbase.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls}
---
@@ -3187,7 +3205,7 @@ public string UsernameTemplate { get; set; }
Template describing how dynamic usernames are generated.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
---
@@ -3201,7 +3219,7 @@ public object VerifyConnection { get; set; }
Specifies if the connection is verified during initial configuration.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
---
@@ -3265,7 +3283,7 @@ public string Name { get; set; }
Name of the database connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
---
@@ -3279,7 +3297,7 @@ public string Password { get; set; }
The password to be used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
---
@@ -3293,7 +3311,7 @@ public string Url { get; set; }
The URL for Elasticsearch's API.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#url DatabaseSecretsMount#url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#url DatabaseSecretsMount#url}
---
@@ -3307,7 +3325,7 @@ public string Username { get; set; }
The username to be used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
---
@@ -3321,7 +3339,7 @@ public string[] AllowedRoles { get; set; }
A list of roles that are allowed to use this connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
---
@@ -3335,7 +3353,7 @@ public string CaCert { get; set; }
The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#ca_cert DatabaseSecretsMount#ca_cert}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#ca_cert DatabaseSecretsMount#ca_cert}
---
@@ -3349,7 +3367,7 @@ public string CaPath { get; set; }
The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#ca_path DatabaseSecretsMount#ca_path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#ca_path DatabaseSecretsMount#ca_path}
---
@@ -3363,7 +3381,7 @@ public string ClientCert { get; set; }
The path to the certificate for the Elasticsearch client to present for communication.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#client_cert DatabaseSecretsMount#client_cert}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#client_cert DatabaseSecretsMount#client_cert}
---
@@ -3377,7 +3395,7 @@ public string ClientKey { get; set; }
The path to the key for the Elasticsearch client to use for communication.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#client_key DatabaseSecretsMount#client_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#client_key DatabaseSecretsMount#client_key}
---
@@ -3391,7 +3409,7 @@ public System.Collections.Generic.IDictionary Data { get; set; }
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
---
@@ -3405,7 +3423,7 @@ public object Insecure { get; set; }
Whether to disable certificate verification.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#insecure DatabaseSecretsMount#insecure}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#insecure DatabaseSecretsMount#insecure}
---
@@ -3421,7 +3439,7 @@ Specifies the name of the plugin to use for this connection.
Must be prefixed with the name of one of the supported database engine types.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
---
@@ -3435,7 +3453,7 @@ public string[] RootRotationStatements { get; set; }
A list of database statements to be executed to rotate the root user's credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
---
@@ -3449,7 +3467,7 @@ public string TlsServerName { get; set; }
This, if set, is used to set the SNI host when connecting via TLS.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls_server_name DatabaseSecretsMount#tls_server_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_server_name DatabaseSecretsMount#tls_server_name}
---
@@ -3463,7 +3481,7 @@ public string UsernameTemplate { get; set; }
Template describing how dynamic usernames are generated.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
---
@@ -3477,7 +3495,7 @@ public object VerifyConnection { get; set; }
Specifies if the connection is verified during initial configuration.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
---
@@ -3535,7 +3553,7 @@ public string Name { get; set; }
Name of the database connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
---
@@ -3549,7 +3567,7 @@ public string[] AllowedRoles { get; set; }
A list of roles that are allowed to use this connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
---
@@ -3563,7 +3581,7 @@ public string ConnectionUrl { get; set; }
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
---
@@ -3577,7 +3595,7 @@ public System.Collections.Generic.IDictionary Data { get; set; }
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
---
@@ -3591,7 +3609,7 @@ public object DisableEscaping { get; set; }
Disable special character escaping in username and password.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping}
---
@@ -3605,7 +3623,7 @@ public double MaxConnectionLifetime { get; set; }
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
---
@@ -3619,7 +3637,7 @@ public double MaxIdleConnections { get; set; }
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
---
@@ -3633,7 +3651,7 @@ public double MaxOpenConnections { get; set; }
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
---
@@ -3647,7 +3665,7 @@ public string Password { get; set; }
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
---
@@ -3663,7 +3681,7 @@ Specifies the name of the plugin to use for this connection.
Must be prefixed with the name of one of the supported database engine types.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
---
@@ -3677,7 +3695,7 @@ public string[] RootRotationStatements { get; set; }
A list of database statements to be executed to rotate the root user's credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
---
@@ -3691,7 +3709,7 @@ public string Username { get; set; }
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
---
@@ -3705,7 +3723,7 @@ public object VerifyConnection { get; set; }
Specifies if the connection is verified during initial configuration.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
---
@@ -3769,7 +3787,7 @@ public string Host { get; set; }
Influxdb host to connect to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#host DatabaseSecretsMount#host}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#host DatabaseSecretsMount#host}
---
@@ -3783,7 +3801,7 @@ public string Name { get; set; }
Name of the database connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
---
@@ -3797,7 +3815,7 @@ public string Password { get; set; }
Specifies the password corresponding to the given username.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
---
@@ -3811,7 +3829,7 @@ public string Username { get; set; }
Specifies the username to use for superuser access.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
---
@@ -3825,7 +3843,7 @@ public string[] AllowedRoles { get; set; }
A list of roles that are allowed to use this connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
---
@@ -3839,7 +3857,7 @@ public double ConnectTimeout { get; set; }
The number of seconds to use as a connection timeout.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connect_timeout DatabaseSecretsMount#connect_timeout}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connect_timeout DatabaseSecretsMount#connect_timeout}
---
@@ -3853,7 +3871,7 @@ public System.Collections.Generic.IDictionary Data { get; set; }
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
---
@@ -3867,7 +3885,7 @@ public object InsecureTls { get; set; }
Whether to skip verification of the server certificate when using TLS.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls}
---
@@ -3883,7 +3901,7 @@ Concatenated PEM blocks containing a certificate and private key;
a certificate, private key, and issuing CA certificate; or just a CA certificate.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#pem_bundle DatabaseSecretsMount#pem_bundle}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#pem_bundle DatabaseSecretsMount#pem_bundle}
---
@@ -3899,7 +3917,7 @@ Specifies JSON containing a certificate and private key;
a certificate, private key, and issuing CA certificate; or just a CA certificate.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#pem_json DatabaseSecretsMount#pem_json}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#pem_json DatabaseSecretsMount#pem_json}
---
@@ -3915,7 +3933,7 @@ Specifies the name of the plugin to use for this connection.
Must be prefixed with the name of one of the supported database engine types.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
---
@@ -3929,7 +3947,7 @@ public double Port { get; set; }
The transport port to use to connect to Influxdb.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#port DatabaseSecretsMount#port}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#port DatabaseSecretsMount#port}
---
@@ -3943,7 +3961,7 @@ public string[] RootRotationStatements { get; set; }
A list of database statements to be executed to rotate the root user's credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
---
@@ -3957,7 +3975,7 @@ public object Tls { get; set; }
Whether to use TLS when connecting to Influxdb.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls}
---
@@ -3971,7 +3989,7 @@ public string UsernameTemplate { get; set; }
Template describing how dynamic usernames are generated.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
---
@@ -3985,7 +4003,7 @@ public object VerifyConnection { get; set; }
Specifies if the connection is verified during initial configuration.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
---
@@ -4043,7 +4061,7 @@ public string Name { get; set; }
Name of the database connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
---
@@ -4057,7 +4075,7 @@ public string[] AllowedRoles { get; set; }
A list of roles that are allowed to use this connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
---
@@ -4071,7 +4089,7 @@ public string ConnectionUrl { get; set; }
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
---
@@ -4085,7 +4103,7 @@ public System.Collections.Generic.IDictionary Data { get; set; }
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
---
@@ -4099,7 +4117,7 @@ public double MaxConnectionLifetime { get; set; }
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
---
@@ -4113,7 +4131,7 @@ public double MaxIdleConnections { get; set; }
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
---
@@ -4127,7 +4145,7 @@ public double MaxOpenConnections { get; set; }
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
---
@@ -4141,7 +4159,7 @@ public string Password { get; set; }
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
---
@@ -4157,7 +4175,7 @@ Specifies the name of the plugin to use for this connection.
Must be prefixed with the name of one of the supported database engine types.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
---
@@ -4171,7 +4189,7 @@ public string[] RootRotationStatements { get; set; }
A list of database statements to be executed to rotate the root user's credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
---
@@ -4185,7 +4203,7 @@ public string Username { get; set; }
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
---
@@ -4199,7 +4217,7 @@ public string UsernameTemplate { get; set; }
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
---
@@ -4213,7 +4231,7 @@ public object VerifyConnection { get; set; }
Specifies if the connection is verified during initial configuration.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
---
@@ -4263,7 +4281,7 @@ public string Name { get; set; }
Name of the database connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
---
@@ -4277,7 +4295,7 @@ public string PrivateKey { get; set; }
The Private Programmatic API Key used to connect with MongoDB Atlas API.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#private_key DatabaseSecretsMount#private_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#private_key DatabaseSecretsMount#private_key}
---
@@ -4291,7 +4309,7 @@ public string ProjectId { get; set; }
The Project ID the Database User should be created within.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#project_id DatabaseSecretsMount#project_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#project_id DatabaseSecretsMount#project_id}
---
@@ -4305,7 +4323,7 @@ public string PublicKey { get; set; }
The Public Programmatic API Key used to authenticate with the MongoDB Atlas API.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#public_key DatabaseSecretsMount#public_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#public_key DatabaseSecretsMount#public_key}
---
@@ -4319,7 +4337,7 @@ public string[] AllowedRoles { get; set; }
A list of roles that are allowed to use this connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
---
@@ -4333,7 +4351,7 @@ public System.Collections.Generic.IDictionary Data { get; set; }
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
---
@@ -4349,7 +4367,7 @@ Specifies the name of the plugin to use for this connection.
Must be prefixed with the name of one of the supported database engine types.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
---
@@ -4363,7 +4381,7 @@ public string[] RootRotationStatements { get; set; }
A list of database statements to be executed to rotate the root user's credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
---
@@ -4377,7 +4395,7 @@ public object VerifyConnection { get; set; }
Specifies if the connection is verified during initial configuration.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
---
@@ -4439,7 +4457,7 @@ public string Name { get; set; }
Name of the database connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
---
@@ -4453,7 +4471,7 @@ public string[] AllowedRoles { get; set; }
A list of roles that are allowed to use this connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
---
@@ -4467,7 +4485,7 @@ public string ConnectionUrl { get; set; }
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
---
@@ -4481,7 +4499,7 @@ public object ContainedDb { get; set; }
Set to true when the target is a Contained Database, e.g. AzureSQL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#contained_db DatabaseSecretsMount#contained_db}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#contained_db DatabaseSecretsMount#contained_db}
---
@@ -4495,7 +4513,7 @@ public System.Collections.Generic.IDictionary Data { get; set; }
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
---
@@ -4509,7 +4527,7 @@ public object DisableEscaping { get; set; }
Disable special character escaping in username and password.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping}
---
@@ -4523,7 +4541,7 @@ public double MaxConnectionLifetime { get; set; }
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
---
@@ -4537,7 +4555,7 @@ public double MaxIdleConnections { get; set; }
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
---
@@ -4551,7 +4569,7 @@ public double MaxOpenConnections { get; set; }
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
---
@@ -4565,7 +4583,7 @@ public string Password { get; set; }
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
---
@@ -4581,7 +4599,7 @@ Specifies the name of the plugin to use for this connection.
Must be prefixed with the name of one of the supported database engine types.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
---
@@ -4595,7 +4613,7 @@ public string[] RootRotationStatements { get; set; }
A list of database statements to be executed to rotate the root user's credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
---
@@ -4609,7 +4627,7 @@ public string Username { get; set; }
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
---
@@ -4623,7 +4641,7 @@ public string UsernameTemplate { get; set; }
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
---
@@ -4637,7 +4655,7 @@ public object VerifyConnection { get; set; }
Specifies if the connection is verified during initial configuration.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
---
@@ -4703,7 +4721,7 @@ public string Name { get; set; }
Name of the database connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
---
@@ -4717,7 +4735,7 @@ public string[] AllowedRoles { get; set; }
A list of roles that are allowed to use this connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
---
@@ -4731,7 +4749,7 @@ public string AuthType { get; set; }
Specify alternative authorization type. (Only 'gcp_iam' is valid currently).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type}
---
@@ -4745,7 +4763,7 @@ public string ConnectionUrl { get; set; }
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
---
@@ -4759,7 +4777,7 @@ public System.Collections.Generic.IDictionary Data { get; set; }
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
---
@@ -4773,7 +4791,7 @@ public double MaxConnectionLifetime { get; set; }
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
---
@@ -4787,7 +4805,7 @@ public double MaxIdleConnections { get; set; }
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
---
@@ -4801,7 +4819,7 @@ public double MaxOpenConnections { get; set; }
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
---
@@ -4815,7 +4833,7 @@ public string Password { get; set; }
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
---
@@ -4831,7 +4849,7 @@ Specifies the name of the plugin to use for this connection.
Must be prefixed with the name of one of the supported database engine types.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
---
@@ -4845,7 +4863,7 @@ public string[] RootRotationStatements { get; set; }
A list of database statements to be executed to rotate the root user's credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
---
@@ -4859,7 +4877,7 @@ public string ServiceAccountJson { get; set; }
A JSON encoded credential for use with IAM authorization.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json}
---
@@ -4873,7 +4891,7 @@ public string TlsCa { get; set; }
x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca}
---
@@ -4889,7 +4907,7 @@ x509 certificate for connecting to the database.
This must be a PEM encoded version of the private key and the certificate combined.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key}
---
@@ -4903,7 +4921,7 @@ public string Username { get; set; }
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
---
@@ -4917,7 +4935,7 @@ public string UsernameTemplate { get; set; }
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
---
@@ -4931,7 +4949,7 @@ public object VerifyConnection { get; set; }
Specifies if the connection is verified during initial configuration.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
---
@@ -4997,7 +5015,7 @@ public string Name { get; set; }
Name of the database connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
---
@@ -5011,7 +5029,7 @@ public string[] AllowedRoles { get; set; }
A list of roles that are allowed to use this connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
---
@@ -5025,7 +5043,7 @@ public string AuthType { get; set; }
Specify alternative authorization type. (Only 'gcp_iam' is valid currently).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type}
---
@@ -5039,7 +5057,7 @@ public string ConnectionUrl { get; set; }
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
---
@@ -5053,7 +5071,7 @@ public System.Collections.Generic.IDictionary Data { get; set; }
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
---
@@ -5067,7 +5085,7 @@ public double MaxConnectionLifetime { get; set; }
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
---
@@ -5081,7 +5099,7 @@ public double MaxIdleConnections { get; set; }
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
---
@@ -5095,7 +5113,7 @@ public double MaxOpenConnections { get; set; }
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
---
@@ -5109,7 +5127,7 @@ public string Password { get; set; }
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
---
@@ -5125,7 +5143,7 @@ Specifies the name of the plugin to use for this connection.
Must be prefixed with the name of one of the supported database engine types.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
---
@@ -5139,7 +5157,7 @@ public string[] RootRotationStatements { get; set; }
A list of database statements to be executed to rotate the root user's credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
---
@@ -5153,7 +5171,7 @@ public string ServiceAccountJson { get; set; }
A JSON encoded credential for use with IAM authorization.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json}
---
@@ -5167,7 +5185,7 @@ public string TlsCa { get; set; }
x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca}
---
@@ -5183,7 +5201,7 @@ x509 certificate for connecting to the database.
This must be a PEM encoded version of the private key and the certificate combined.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key}
---
@@ -5197,7 +5215,7 @@ public string Username { get; set; }
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
---
@@ -5211,7 +5229,7 @@ public string UsernameTemplate { get; set; }
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
---
@@ -5225,7 +5243,7 @@ public object VerifyConnection { get; set; }
Specifies if the connection is verified during initial configuration.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
---
@@ -5291,7 +5309,7 @@ public string Name { get; set; }
Name of the database connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
---
@@ -5305,7 +5323,7 @@ public string[] AllowedRoles { get; set; }
A list of roles that are allowed to use this connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
---
@@ -5319,7 +5337,7 @@ public string AuthType { get; set; }
Specify alternative authorization type. (Only 'gcp_iam' is valid currently).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type}
---
@@ -5333,7 +5351,7 @@ public string ConnectionUrl { get; set; }
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
---
@@ -5347,7 +5365,7 @@ public System.Collections.Generic.IDictionary Data { get; set; }
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
---
@@ -5361,7 +5379,7 @@ public double MaxConnectionLifetime { get; set; }
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
---
@@ -5375,7 +5393,7 @@ public double MaxIdleConnections { get; set; }
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
---
@@ -5389,7 +5407,7 @@ public double MaxOpenConnections { get; set; }
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
---
@@ -5403,7 +5421,7 @@ public string Password { get; set; }
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
---
@@ -5419,7 +5437,7 @@ Specifies the name of the plugin to use for this connection.
Must be prefixed with the name of one of the supported database engine types.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
---
@@ -5433,7 +5451,7 @@ public string[] RootRotationStatements { get; set; }
A list of database statements to be executed to rotate the root user's credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
---
@@ -5447,7 +5465,7 @@ public string ServiceAccountJson { get; set; }
A JSON encoded credential for use with IAM authorization.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json}
---
@@ -5461,7 +5479,7 @@ public string TlsCa { get; set; }
x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca}
---
@@ -5477,7 +5495,7 @@ x509 certificate for connecting to the database.
This must be a PEM encoded version of the private key and the certificate combined.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key}
---
@@ -5491,7 +5509,7 @@ public string Username { get; set; }
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
---
@@ -5505,7 +5523,7 @@ public string UsernameTemplate { get; set; }
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
---
@@ -5519,7 +5537,7 @@ public object VerifyConnection { get; set; }
Specifies if the connection is verified during initial configuration.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
---
@@ -5585,7 +5603,7 @@ public string Name { get; set; }
Name of the database connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
---
@@ -5599,7 +5617,7 @@ public string[] AllowedRoles { get; set; }
A list of roles that are allowed to use this connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
---
@@ -5613,7 +5631,7 @@ public string AuthType { get; set; }
Specify alternative authorization type. (Only 'gcp_iam' is valid currently).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type}
---
@@ -5627,7 +5645,7 @@ public string ConnectionUrl { get; set; }
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
---
@@ -5641,7 +5659,7 @@ public System.Collections.Generic.IDictionary Data { get; set; }
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
---
@@ -5655,7 +5673,7 @@ public double MaxConnectionLifetime { get; set; }
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
---
@@ -5669,7 +5687,7 @@ public double MaxIdleConnections { get; set; }
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
---
@@ -5683,7 +5701,7 @@ public double MaxOpenConnections { get; set; }
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
---
@@ -5697,7 +5715,7 @@ public string Password { get; set; }
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
---
@@ -5713,7 +5731,7 @@ Specifies the name of the plugin to use for this connection.
Must be prefixed with the name of one of the supported database engine types.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
---
@@ -5727,7 +5745,7 @@ public string[] RootRotationStatements { get; set; }
A list of database statements to be executed to rotate the root user's credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
---
@@ -5741,7 +5759,7 @@ public string ServiceAccountJson { get; set; }
A JSON encoded credential for use with IAM authorization.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json}
---
@@ -5755,7 +5773,7 @@ public string TlsCa { get; set; }
x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca}
---
@@ -5771,7 +5789,7 @@ x509 certificate for connecting to the database.
This must be a PEM encoded version of the private key and the certificate combined.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key}
---
@@ -5785,7 +5803,7 @@ public string Username { get; set; }
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
---
@@ -5799,7 +5817,7 @@ public string UsernameTemplate { get; set; }
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
---
@@ -5813,7 +5831,7 @@ public object VerifyConnection { get; set; }
Specifies if the connection is verified during initial configuration.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
---
@@ -5875,7 +5893,7 @@ public string Name { get; set; }
Name of the database connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
---
@@ -5889,7 +5907,7 @@ public string[] AllowedRoles { get; set; }
A list of roles that are allowed to use this connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
---
@@ -5903,7 +5921,7 @@ public string ConnectionUrl { get; set; }
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
---
@@ -5917,7 +5935,7 @@ public System.Collections.Generic.IDictionary Data { get; set; }
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
---
@@ -5931,7 +5949,7 @@ public object DisconnectSessions { get; set; }
Set to true to disconnect any open sessions prior to running the revocation statements.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#disconnect_sessions DatabaseSecretsMount#disconnect_sessions}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#disconnect_sessions DatabaseSecretsMount#disconnect_sessions}
---
@@ -5945,7 +5963,7 @@ public double MaxConnectionLifetime { get; set; }
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
---
@@ -5959,7 +5977,7 @@ public double MaxIdleConnections { get; set; }
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
---
@@ -5973,7 +5991,7 @@ public double MaxOpenConnections { get; set; }
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
---
@@ -5987,7 +6005,7 @@ public string Password { get; set; }
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
---
@@ -6003,7 +6021,7 @@ Specifies the name of the plugin to use for this connection.
Must be prefixed with the name of one of the supported database engine types.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
---
@@ -6017,7 +6035,7 @@ public string[] RootRotationStatements { get; set; }
A list of database statements to be executed to rotate the root user's credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
---
@@ -6031,7 +6049,7 @@ public object SplitStatements { get; set; }
Set to true in order to split statements after semi-colons.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#split_statements DatabaseSecretsMount#split_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#split_statements DatabaseSecretsMount#split_statements}
---
@@ -6045,7 +6063,7 @@ public string Username { get; set; }
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
---
@@ -6059,7 +6077,7 @@ public string UsernameTemplate { get; set; }
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
---
@@ -6073,7 +6091,7 @@ public object VerifyConnection { get; set; }
Specifies if the connection is verified during initial configuration.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
---
@@ -6096,8 +6114,12 @@ new DatabaseSecretsMountPostgresql {
double MaxOpenConnections = null,
string Password = null,
string PluginName = null,
+ string PrivateKey = null,
string[] RootRotationStatements = null,
+ object SelfManaged = null,
string ServiceAccountJson = null,
+ string TlsCa = null,
+ string TlsCertificate = null,
string Username = null,
string UsernameTemplate = null,
object VerifyConnection = null
@@ -6119,8 +6141,12 @@ new DatabaseSecretsMountPostgresql {
| MaxOpenConnections
| double
| Maximum number of open connections to the database. |
| Password
| string
| The root credential password used in the connection URL. |
| PluginName
| string
| Specifies the name of the plugin to use for this connection. |
+| PrivateKey
| string
| The secret key used for the x509 client certificate. Must be PEM encoded. |
| RootRotationStatements
| string[]
| A list of database statements to be executed to rotate the root user's credentials. |
+| SelfManaged
| object
| If set, allows onboarding static roles with a rootless connection configuration. |
| ServiceAccountJson
| string
| A JSON encoded credential for use with IAM authorization. |
+| TlsCa
| string
| The x509 CA file for validating the certificate presented by the PostgreSQL server. Must be PEM encoded. |
+| TlsCertificate
| string
| The x509 client certificate for connecting to the database. Must be PEM encoded. |
| Username
| string
| The root credential username used in the connection URL. |
| UsernameTemplate
| string
| Username generation template. |
| VerifyConnection
| object
| Specifies if the connection is verified during initial configuration. |
@@ -6137,7 +6163,7 @@ public string Name { get; set; }
Name of the database connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
---
@@ -6151,7 +6177,7 @@ public string[] AllowedRoles { get; set; }
A list of roles that are allowed to use this connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
---
@@ -6165,7 +6191,7 @@ public string AuthType { get; set; }
Specify alternative authorization type. (Only 'gcp_iam' is valid currently).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type}
---
@@ -6179,7 +6205,7 @@ public string ConnectionUrl { get; set; }
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
---
@@ -6193,7 +6219,7 @@ public System.Collections.Generic.IDictionary Data { get; set; }
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
---
@@ -6207,7 +6233,7 @@ public object DisableEscaping { get; set; }
Disable special character escaping in username and password.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping}
---
@@ -6221,7 +6247,7 @@ public double MaxConnectionLifetime { get; set; }
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
---
@@ -6235,7 +6261,7 @@ public double MaxIdleConnections { get; set; }
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
---
@@ -6249,7 +6275,7 @@ public double MaxOpenConnections { get; set; }
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
---
@@ -6263,7 +6289,7 @@ public string Password { get; set; }
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
---
@@ -6279,7 +6305,21 @@ Specifies the name of the plugin to use for this connection.
Must be prefixed with the name of one of the supported database engine types.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
+
+---
+
+##### `PrivateKey`Optional
+
+```csharp
+public string PrivateKey { get; set; }
+```
+
+- *Type:* string
+
+The secret key used for the x509 client certificate. Must be PEM encoded.
+
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#private_key DatabaseSecretsMount#private_key}
---
@@ -6293,7 +6333,21 @@ public string[] RootRotationStatements { get; set; }
A list of database statements to be executed to rotate the root user's credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
+
+---
+
+##### `SelfManaged`Optional
+
+```csharp
+public object SelfManaged { get; set; }
+```
+
+- *Type:* object
+
+If set, allows onboarding static roles with a rootless connection configuration.
+
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#self_managed DatabaseSecretsMount#self_managed}
---
@@ -6307,7 +6361,35 @@ public string ServiceAccountJson { get; set; }
A JSON encoded credential for use with IAM authorization.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json}
+
+---
+
+##### `TlsCa`Optional
+
+```csharp
+public string TlsCa { get; set; }
+```
+
+- *Type:* string
+
+The x509 CA file for validating the certificate presented by the PostgreSQL server. Must be PEM encoded.
+
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca}
+
+---
+
+##### `TlsCertificate`Optional
+
+```csharp
+public string TlsCertificate { get; set; }
+```
+
+- *Type:* string
+
+The x509 client certificate for connecting to the database. Must be PEM encoded.
+
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_certificate DatabaseSecretsMount#tls_certificate}
---
@@ -6321,7 +6403,7 @@ public string Username { get; set; }
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
---
@@ -6335,7 +6417,7 @@ public string UsernameTemplate { get; set; }
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
---
@@ -6349,7 +6431,7 @@ public object VerifyConnection { get; set; }
Specifies if the connection is verified during initial configuration.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
---
@@ -6407,7 +6489,7 @@ public string Host { get; set; }
Specifies the host to connect to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#host DatabaseSecretsMount#host}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#host DatabaseSecretsMount#host}
---
@@ -6421,7 +6503,7 @@ public string Name { get; set; }
Name of the database connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
---
@@ -6435,7 +6517,7 @@ public string Password { get; set; }
Specifies the password corresponding to the given username.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
---
@@ -6449,7 +6531,7 @@ public string Username { get; set; }
Specifies the username for Vault to use.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
---
@@ -6463,7 +6545,7 @@ public string[] AllowedRoles { get; set; }
A list of roles that are allowed to use this connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
---
@@ -6477,7 +6559,7 @@ public string CaCert { get; set; }
The contents of a PEM-encoded CA cert file to use to verify the Redis server's identity.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#ca_cert DatabaseSecretsMount#ca_cert}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#ca_cert DatabaseSecretsMount#ca_cert}
---
@@ -6491,7 +6573,7 @@ public System.Collections.Generic.IDictionary Data { get; set; }
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
---
@@ -6505,7 +6587,7 @@ public object InsecureTls { get; set; }
Specifies whether to skip verification of the server certificate when using TLS.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls}
---
@@ -6521,7 +6603,7 @@ Specifies the name of the plugin to use for this connection.
Must be prefixed with the name of one of the supported database engine types.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
---
@@ -6535,7 +6617,7 @@ public double Port { get; set; }
The transport port to use to connect to Redis.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#port DatabaseSecretsMount#port}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#port DatabaseSecretsMount#port}
---
@@ -6549,7 +6631,7 @@ public string[] RootRotationStatements { get; set; }
A list of database statements to be executed to rotate the root user's credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
---
@@ -6563,7 +6645,7 @@ public object Tls { get; set; }
Specifies whether to use TLS when connecting to Redis.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls}
---
@@ -6577,7 +6659,7 @@ public object VerifyConnection { get; set; }
Specifies if the connection is verified during initial configuration.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
---
@@ -6629,7 +6711,7 @@ public string Name { get; set; }
Name of the database connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
---
@@ -6643,7 +6725,7 @@ public string Url { get; set; }
The configuration endpoint for the ElastiCache cluster to connect to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#url DatabaseSecretsMount#url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#url DatabaseSecretsMount#url}
---
@@ -6657,7 +6739,7 @@ public string[] AllowedRoles { get; set; }
A list of roles that are allowed to use this connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
---
@@ -6671,7 +6753,7 @@ public System.Collections.Generic.IDictionary Data { get; set; }
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
---
@@ -6687,7 +6769,7 @@ The AWS secret key id to use to talk to ElastiCache.
If omitted the credentials chain provider is used instead.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
---
@@ -6703,7 +6785,7 @@ Specifies the name of the plugin to use for this connection.
Must be prefixed with the name of one of the supported database engine types.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
---
@@ -6719,7 +6801,7 @@ The AWS region where the ElastiCache cluster is hosted.
If omitted the plugin tries to infer the region from the environment.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#region DatabaseSecretsMount#region}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#region DatabaseSecretsMount#region}
---
@@ -6733,7 +6815,7 @@ public string[] RootRotationStatements { get; set; }
A list of database statements to be executed to rotate the root user's credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
---
@@ -6749,7 +6831,7 @@ The AWS access key id to use to talk to ElastiCache.
If omitted the credentials chain provider is used instead.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
---
@@ -6763,7 +6845,7 @@ public object VerifyConnection { get; set; }
Specifies if the connection is verified during initial configuration.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
---
@@ -6823,7 +6905,7 @@ public string Name { get; set; }
Name of the database connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
---
@@ -6837,7 +6919,7 @@ public string[] AllowedRoles { get; set; }
A list of roles that are allowed to use this connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
---
@@ -6851,7 +6933,7 @@ public string ConnectionUrl { get; set; }
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
---
@@ -6865,7 +6947,7 @@ public System.Collections.Generic.IDictionary Data { get; set; }
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
---
@@ -6879,7 +6961,7 @@ public object DisableEscaping { get; set; }
Disable special character escaping in username and password.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping}
---
@@ -6893,7 +6975,7 @@ public double MaxConnectionLifetime { get; set; }
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
---
@@ -6907,7 +6989,7 @@ public double MaxIdleConnections { get; set; }
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
---
@@ -6921,7 +7003,7 @@ public double MaxOpenConnections { get; set; }
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
---
@@ -6935,7 +7017,7 @@ public string Password { get; set; }
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
---
@@ -6951,7 +7033,7 @@ Specifies the name of the plugin to use for this connection.
Must be prefixed with the name of one of the supported database engine types.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
---
@@ -6965,7 +7047,7 @@ public string[] RootRotationStatements { get; set; }
A list of database statements to be executed to rotate the root user's credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
---
@@ -6979,7 +7061,7 @@ public string Username { get; set; }
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
---
@@ -6993,7 +7075,7 @@ public string UsernameTemplate { get; set; }
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
---
@@ -7007,7 +7089,7 @@ public object VerifyConnection { get; set; }
Specifies if the connection is verified during initial configuration.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
---
@@ -7065,7 +7147,7 @@ public string Name { get; set; }
Name of the database connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
---
@@ -7079,7 +7161,7 @@ public string[] AllowedRoles { get; set; }
A list of roles that are allowed to use this connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
---
@@ -7093,7 +7175,7 @@ public string ConnectionUrl { get; set; }
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
---
@@ -7107,7 +7189,7 @@ public System.Collections.Generic.IDictionary Data { get; set; }
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
---
@@ -7121,7 +7203,7 @@ public double MaxConnectionLifetime { get; set; }
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
---
@@ -7135,7 +7217,7 @@ public double MaxIdleConnections { get; set; }
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
---
@@ -7149,7 +7231,7 @@ public double MaxOpenConnections { get; set; }
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
---
@@ -7163,7 +7245,7 @@ public string Password { get; set; }
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
---
@@ -7179,7 +7261,7 @@ Specifies the name of the plugin to use for this connection.
Must be prefixed with the name of one of the supported database engine types.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
---
@@ -7193,7 +7275,7 @@ public string[] RootRotationStatements { get; set; }
A list of database statements to be executed to rotate the root user's credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
---
@@ -7207,7 +7289,7 @@ public string Username { get; set; }
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
---
@@ -7221,7 +7303,7 @@ public string UsernameTemplate { get; set; }
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
---
@@ -7235,7 +7317,7 @@ public object VerifyConnection { get; set; }
Specifies if the connection is verified during initial configuration.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
---
@@ -7481,6 +7563,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it
| ResetPort
| *No description.* |
| ResetProtocolVersion
| *No description.* |
| ResetRootRotationStatements
| *No description.* |
+| ResetSkipVerification
| *No description.* |
| ResetTls
| *No description.* |
| ResetUsername
| *No description.* |
| ResetVerifyConnection
| *No description.* |
@@ -7709,6 +7792,12 @@ private void ResetProtocolVersion()
private void ResetRootRotationStatements()
```
+##### `ResetSkipVerification`
+
+```csharp
+private void ResetSkipVerification()
+```
+
##### `ResetTls`
```csharp
@@ -7747,6 +7836,7 @@ private void ResetVerifyConnection()
| PortInput
| double
| *No description.* |
| ProtocolVersionInput
| double
| *No description.* |
| RootRotationStatementsInput
| string[]
| *No description.* |
+| SkipVerificationInput
| object
| *No description.* |
| TlsInput
| object
| *No description.* |
| UsernameInput
| string
| *No description.* |
| VerifyConnectionInput
| object
| *No description.* |
@@ -7763,6 +7853,7 @@ private void ResetVerifyConnection()
| Port
| double
| *No description.* |
| ProtocolVersion
| double
| *No description.* |
| RootRotationStatements
| string[]
| *No description.* |
+| SkipVerification
| object
| *No description.* |
| Tls
| object
| *No description.* |
| Username
| string
| *No description.* |
| VerifyConnection
| object
| *No description.* |
@@ -7924,6 +8015,16 @@ public string[] RootRotationStatementsInput { get; }
---
+##### `SkipVerificationInput`Optional
+
+```csharp
+public object SkipVerificationInput { get; }
+```
+
+- *Type:* object
+
+---
+
##### `TlsInput`Optional
```csharp
@@ -8084,6 +8185,16 @@ public string[] RootRotationStatements { get; }
---
+##### `SkipVerification`Required
+
+```csharp
+public object SkipVerification { get; }
+```
+
+- *Type:* object
+
+---
+
##### `Tls`Required
```csharp
@@ -18510,8 +18621,12 @@ whether the list is wrapping a set (will add tolist() to be able to access an it
| ResetMaxOpenConnections
| *No description.* |
| ResetPassword
| *No description.* |
| ResetPluginName
| *No description.* |
+| ResetPrivateKey
| *No description.* |
| ResetRootRotationStatements
| *No description.* |
+| ResetSelfManaged
| *No description.* |
| ResetServiceAccountJson
| *No description.* |
+| ResetTlsCa
| *No description.* |
+| ResetTlsCertificate
| *No description.* |
| ResetUsername
| *No description.* |
| ResetUsernameTemplate
| *No description.* |
| ResetVerifyConnection
| *No description.* |
@@ -18728,18 +18843,42 @@ private void ResetPassword()
private void ResetPluginName()
```
+##### `ResetPrivateKey`
+
+```csharp
+private void ResetPrivateKey()
+```
+
##### `ResetRootRotationStatements`
```csharp
private void ResetRootRotationStatements()
```
+##### `ResetSelfManaged`
+
+```csharp
+private void ResetSelfManaged()
+```
+
##### `ResetServiceAccountJson`
```csharp
private void ResetServiceAccountJson()
```
+##### `ResetTlsCa`
+
+```csharp
+private void ResetTlsCa()
+```
+
+##### `ResetTlsCertificate`
+
+```csharp
+private void ResetTlsCertificate()
+```
+
##### `ResetUsername`
```csharp
@@ -18776,8 +18915,12 @@ private void ResetVerifyConnection()
| NameInput
| string
| *No description.* |
| PasswordInput
| string
| *No description.* |
| PluginNameInput
| string
| *No description.* |
+| PrivateKeyInput
| string
| *No description.* |
| RootRotationStatementsInput
| string[]
| *No description.* |
+| SelfManagedInput
| object
| *No description.* |
| ServiceAccountJsonInput
| string
| *No description.* |
+| TlsCaInput
| string
| *No description.* |
+| TlsCertificateInput
| string
| *No description.* |
| UsernameInput
| string
| *No description.* |
| UsernameTemplateInput
| string
| *No description.* |
| VerifyConnectionInput
| object
| *No description.* |
@@ -18792,8 +18935,12 @@ private void ResetVerifyConnection()
| Name
| string
| *No description.* |
| Password
| string
| *No description.* |
| PluginName
| string
| *No description.* |
+| PrivateKey
| string
| *No description.* |
| RootRotationStatements
| string[]
| *No description.* |
+| SelfManaged
| object
| *No description.* |
| ServiceAccountJson
| string
| *No description.* |
+| TlsCa
| string
| *No description.* |
+| TlsCertificate
| string
| *No description.* |
| Username
| string
| *No description.* |
| UsernameTemplate
| string
| *No description.* |
| VerifyConnection
| object
| *No description.* |
@@ -18935,6 +19082,16 @@ public string PluginNameInput { get; }
---
+##### `PrivateKeyInput`Optional
+
+```csharp
+public string PrivateKeyInput { get; }
+```
+
+- *Type:* string
+
+---
+
##### `RootRotationStatementsInput`Optional
```csharp
@@ -18945,6 +19102,16 @@ public string[] RootRotationStatementsInput { get; }
---
+##### `SelfManagedInput`Optional
+
+```csharp
+public object SelfManagedInput { get; }
+```
+
+- *Type:* object
+
+---
+
##### `ServiceAccountJsonInput`Optional
```csharp
@@ -18955,6 +19122,26 @@ public string ServiceAccountJsonInput { get; }
---
+##### `TlsCaInput`Optional
+
+```csharp
+public string TlsCaInput { get; }
+```
+
+- *Type:* string
+
+---
+
+##### `TlsCertificateInput`Optional
+
+```csharp
+public string TlsCertificateInput { get; }
+```
+
+- *Type:* string
+
+---
+
##### `UsernameInput`Optional
```csharp
@@ -19095,6 +19282,16 @@ public string PluginName { get; }
---
+##### `PrivateKey`Required
+
+```csharp
+public string PrivateKey { get; }
+```
+
+- *Type:* string
+
+---
+
##### `RootRotationStatements`Required
```csharp
@@ -19105,6 +19302,16 @@ public string[] RootRotationStatements { get; }
---
+##### `SelfManaged`Required
+
+```csharp
+public object SelfManaged { get; }
+```
+
+- *Type:* object
+
+---
+
##### `ServiceAccountJson`Required
```csharp
@@ -19115,6 +19322,26 @@ public string ServiceAccountJson { get; }
---
+##### `TlsCa`Required
+
+```csharp
+public string TlsCa { get; }
+```
+
+- *Type:* string
+
+---
+
+##### `TlsCertificate`Required
+
+```csharp
+public string TlsCertificate { get; }
+```
+
+- *Type:* string
+
+---
+
##### `Username`Required
```csharp
diff --git a/docs/databaseSecretsMount.go.md b/docs/databaseSecretsMount.go.md
index 31390455..5fa3262a 100644
--- a/docs/databaseSecretsMount.go.md
+++ b/docs/databaseSecretsMount.go.md
@@ -4,7 +4,7 @@
### DatabaseSecretsMount
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount vault_database_secrets_mount}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount vault_database_secrets_mount}.
#### Initializers
@@ -953,7 +953,7 @@ The construct id used in the generated config for the DatabaseSecretsMount to im
The id of the existing DatabaseSecretsMount that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#import import section} in the documentation of this resource for the id to use
---
@@ -2005,6 +2005,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretsmount"
Port: *f64,
ProtocolVersion: *f64,
RootRotationStatements: *[]*string,
+ SkipVerification: interface{},
Tls: interface{},
Username: *string,
VerifyConnection: interface{},
@@ -2028,6 +2029,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretsmount"
| Port
| *f64
| The transport port to use to connect to Cassandra. |
| ProtocolVersion
| *f64
| The CQL protocol version to use. |
| RootRotationStatements
| *[]*string
| A list of database statements to be executed to rotate the root user's credentials. |
+| SkipVerification
| interface{}
| Skip permissions checks when a connection to Cassandra is first created. |
| Tls
| interface{}
| Whether to use TLS when connecting to Cassandra. |
| Username
| *string
| The username to use when authenticating with Cassandra. |
| VerifyConnection
| interface{}
| Specifies if the connection is verified during initial configuration. |
@@ -2044,7 +2046,7 @@ Name *string
Name of the database connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
---
@@ -2058,7 +2060,7 @@ AllowedRoles *[]*string
A list of roles that are allowed to use this connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
---
@@ -2072,7 +2074,7 @@ ConnectTimeout *f64
The number of seconds to use as a connection timeout.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connect_timeout DatabaseSecretsMount#connect_timeout}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connect_timeout DatabaseSecretsMount#connect_timeout}
---
@@ -2086,7 +2088,7 @@ Data *map[string]*string
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
---
@@ -2100,7 +2102,7 @@ Hosts *[]*string
Cassandra hosts to connect to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#hosts DatabaseSecretsMount#hosts}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#hosts DatabaseSecretsMount#hosts}
---
@@ -2114,7 +2116,7 @@ InsecureTls interface{}
Whether to skip verification of the server certificate when using TLS.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls}
---
@@ -2128,7 +2130,7 @@ Password *string
The password to use when authenticating with Cassandra.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
---
@@ -2144,7 +2146,7 @@ Concatenated PEM blocks containing a certificate and private key;
a certificate, private key, and issuing CA certificate; or just a CA certificate.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#pem_bundle DatabaseSecretsMount#pem_bundle}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#pem_bundle DatabaseSecretsMount#pem_bundle}
---
@@ -2160,7 +2162,7 @@ Specifies JSON containing a certificate and private key;
a certificate, private key, and issuing CA certificate; or just a CA certificate.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#pem_json DatabaseSecretsMount#pem_json}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#pem_json DatabaseSecretsMount#pem_json}
---
@@ -2176,7 +2178,7 @@ Specifies the name of the plugin to use for this connection.
Must be prefixed with the name of one of the supported database engine types.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
---
@@ -2190,7 +2192,7 @@ Port *f64
The transport port to use to connect to Cassandra.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#port DatabaseSecretsMount#port}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#port DatabaseSecretsMount#port}
---
@@ -2204,7 +2206,7 @@ ProtocolVersion *f64
The CQL protocol version to use.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#protocol_version DatabaseSecretsMount#protocol_version}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#protocol_version DatabaseSecretsMount#protocol_version}
---
@@ -2218,7 +2220,23 @@ RootRotationStatements *[]*string
A list of database statements to be executed to rotate the root user's credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
+
+---
+
+##### `SkipVerification`Optional
+
+```go
+SkipVerification interface{}
+```
+
+- *Type:* interface{}
+
+Skip permissions checks when a connection to Cassandra is first created.
+
+These checks ensure that Vault is able to create roles, but can be resource intensive in clusters with many roles.
+
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#skip_verification DatabaseSecretsMount#skip_verification}
---
@@ -2232,7 +2250,7 @@ Tls interface{}
Whether to use TLS when connecting to Cassandra.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls}
---
@@ -2246,7 +2264,7 @@ Username *string
The username to use when authenticating with Cassandra.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
---
@@ -2260,7 +2278,7 @@ VerifyConnection interface{}
Specifies if the connection is verified during initial configuration.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
---
@@ -2343,7 +2361,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretsmount"
| Elasticsearch
| interface{}
| elasticsearch block. |
| ExternalEntropyAccess
| interface{}
| Enable the secrets engine to access Vault's external entropy source. |
| Hana
| interface{}
| hana block. |
-| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#id DatabaseSecretsMount#id}. |
+| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#id DatabaseSecretsMount#id}. |
| IdentityTokenKey
| *string
| The key to use for signing plugin workload identity tokens. |
| Influxdb
| interface{}
| influxdb block. |
| ListingVisibility
| *string
| Specifies whether to show this mount in the UI-specific listing endpoint. |
@@ -2450,7 +2468,7 @@ Path *string
Where the secret backend will be mounted.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#path DatabaseSecretsMount#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#path DatabaseSecretsMount#path}
---
@@ -2464,7 +2482,7 @@ AllowedManagedKeys *[]*string
List of managed key registry entry names that the mount in question is allowed to access.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_managed_keys DatabaseSecretsMount#allowed_managed_keys}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_managed_keys DatabaseSecretsMount#allowed_managed_keys}
---
@@ -2478,7 +2496,7 @@ AllowedResponseHeaders *[]*string
List of headers to allow and pass from the request to the plugin.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_response_headers DatabaseSecretsMount#allowed_response_headers}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_response_headers DatabaseSecretsMount#allowed_response_headers}
---
@@ -2492,7 +2510,7 @@ AuditNonHmacRequestKeys *[]*string
Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#audit_non_hmac_request_keys DatabaseSecretsMount#audit_non_hmac_request_keys}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#audit_non_hmac_request_keys DatabaseSecretsMount#audit_non_hmac_request_keys}
---
@@ -2506,7 +2524,7 @@ AuditNonHmacResponseKeys *[]*string
Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#audit_non_hmac_response_keys DatabaseSecretsMount#audit_non_hmac_response_keys}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#audit_non_hmac_response_keys DatabaseSecretsMount#audit_non_hmac_response_keys}
---
@@ -2520,7 +2538,7 @@ Cassandra interface{}
cassandra block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#cassandra DatabaseSecretsMount#cassandra}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#cassandra DatabaseSecretsMount#cassandra}
---
@@ -2534,7 +2552,7 @@ Couchbase interface{}
couchbase block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#couchbase DatabaseSecretsMount#couchbase}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#couchbase DatabaseSecretsMount#couchbase}
---
@@ -2548,7 +2566,7 @@ DefaultLeaseTtlSeconds *f64
Default lease duration for tokens and secrets in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#default_lease_ttl_seconds DatabaseSecretsMount#default_lease_ttl_seconds}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#default_lease_ttl_seconds DatabaseSecretsMount#default_lease_ttl_seconds}
---
@@ -2562,7 +2580,7 @@ DelegatedAuthAccessors *[]*string
List of headers to allow and pass from the request to the plugin.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#delegated_auth_accessors DatabaseSecretsMount#delegated_auth_accessors}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#delegated_auth_accessors DatabaseSecretsMount#delegated_auth_accessors}
---
@@ -2576,7 +2594,7 @@ Description *string
Human-friendly description of the mount.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#description DatabaseSecretsMount#description}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#description DatabaseSecretsMount#description}
---
@@ -2590,7 +2608,7 @@ Elasticsearch interface{}
elasticsearch block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#elasticsearch DatabaseSecretsMount#elasticsearch}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#elasticsearch DatabaseSecretsMount#elasticsearch}
---
@@ -2604,7 +2622,7 @@ ExternalEntropyAccess interface{}
Enable the secrets engine to access Vault's external entropy source.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#external_entropy_access DatabaseSecretsMount#external_entropy_access}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#external_entropy_access DatabaseSecretsMount#external_entropy_access}
---
@@ -2618,7 +2636,7 @@ Hana interface{}
hana block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#hana DatabaseSecretsMount#hana}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#hana DatabaseSecretsMount#hana}
---
@@ -2630,7 +2648,7 @@ Id *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#id DatabaseSecretsMount#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#id DatabaseSecretsMount#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -2647,7 +2665,7 @@ IdentityTokenKey *string
The key to use for signing plugin workload identity tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#identity_token_key DatabaseSecretsMount#identity_token_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#identity_token_key DatabaseSecretsMount#identity_token_key}
---
@@ -2661,7 +2679,7 @@ Influxdb interface{}
influxdb block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#influxdb DatabaseSecretsMount#influxdb}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#influxdb DatabaseSecretsMount#influxdb}
---
@@ -2675,7 +2693,7 @@ ListingVisibility *string
Specifies whether to show this mount in the UI-specific listing endpoint.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#listing_visibility DatabaseSecretsMount#listing_visibility}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#listing_visibility DatabaseSecretsMount#listing_visibility}
---
@@ -2689,7 +2707,7 @@ Local interface{}
Local mount flag that can be explicitly set to true to enforce local mount in HA environment.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#local DatabaseSecretsMount#local}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#local DatabaseSecretsMount#local}
---
@@ -2703,7 +2721,7 @@ MaxLeaseTtlSeconds *f64
Maximum possible lease duration for tokens and secrets in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_lease_ttl_seconds DatabaseSecretsMount#max_lease_ttl_seconds}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_lease_ttl_seconds DatabaseSecretsMount#max_lease_ttl_seconds}
---
@@ -2717,7 +2735,7 @@ Mongodb interface{}
mongodb block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#mongodb DatabaseSecretsMount#mongodb}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#mongodb DatabaseSecretsMount#mongodb}
---
@@ -2731,7 +2749,7 @@ Mongodbatlas interface{}
mongodbatlas block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#mongodbatlas DatabaseSecretsMount#mongodbatlas}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#mongodbatlas DatabaseSecretsMount#mongodbatlas}
---
@@ -2745,7 +2763,7 @@ Mssql interface{}
mssql block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#mssql DatabaseSecretsMount#mssql}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#mssql DatabaseSecretsMount#mssql}
---
@@ -2759,7 +2777,7 @@ Mysql interface{}
mysql block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#mysql DatabaseSecretsMount#mysql}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#mysql DatabaseSecretsMount#mysql}
---
@@ -2773,7 +2791,7 @@ MysqlAurora interface{}
mysql_aurora block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#mysql_aurora DatabaseSecretsMount#mysql_aurora}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#mysql_aurora DatabaseSecretsMount#mysql_aurora}
---
@@ -2787,7 +2805,7 @@ MysqlLegacy interface{}
mysql_legacy block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#mysql_legacy DatabaseSecretsMount#mysql_legacy}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#mysql_legacy DatabaseSecretsMount#mysql_legacy}
---
@@ -2801,7 +2819,7 @@ MysqlRds interface{}
mysql_rds block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#mysql_rds DatabaseSecretsMount#mysql_rds}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#mysql_rds DatabaseSecretsMount#mysql_rds}
---
@@ -2815,7 +2833,7 @@ Namespace *string
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#namespace DatabaseSecretsMount#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#namespace DatabaseSecretsMount#namespace}
---
@@ -2829,7 +2847,7 @@ Options *map[string]*string
Specifies mount type specific options that are passed to the backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#options DatabaseSecretsMount#options}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#options DatabaseSecretsMount#options}
---
@@ -2843,7 +2861,7 @@ Oracle interface{}
oracle block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#oracle DatabaseSecretsMount#oracle}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#oracle DatabaseSecretsMount#oracle}
---
@@ -2857,7 +2875,7 @@ PassthroughRequestHeaders *[]*string
List of headers to allow and pass from the request to the plugin.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#passthrough_request_headers DatabaseSecretsMount#passthrough_request_headers}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#passthrough_request_headers DatabaseSecretsMount#passthrough_request_headers}
---
@@ -2871,7 +2889,7 @@ PluginVersion *string
Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_version DatabaseSecretsMount#plugin_version}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_version DatabaseSecretsMount#plugin_version}
---
@@ -2885,7 +2903,7 @@ Postgresql interface{}
postgresql block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#postgresql DatabaseSecretsMount#postgresql}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#postgresql DatabaseSecretsMount#postgresql}
---
@@ -2899,7 +2917,7 @@ Redis interface{}
redis block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#redis DatabaseSecretsMount#redis}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#redis DatabaseSecretsMount#redis}
---
@@ -2913,7 +2931,7 @@ RedisElasticache interface{}
redis_elasticache block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#redis_elasticache DatabaseSecretsMount#redis_elasticache}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#redis_elasticache DatabaseSecretsMount#redis_elasticache}
---
@@ -2927,7 +2945,7 @@ Redshift interface{}
redshift block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#redshift DatabaseSecretsMount#redshift}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#redshift DatabaseSecretsMount#redshift}
---
@@ -2941,7 +2959,7 @@ SealWrap interface{}
Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#seal_wrap DatabaseSecretsMount#seal_wrap}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#seal_wrap DatabaseSecretsMount#seal_wrap}
---
@@ -2955,7 +2973,7 @@ Snowflake interface{}
snowflake block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#snowflake DatabaseSecretsMount#snowflake}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#snowflake DatabaseSecretsMount#snowflake}
---
@@ -3015,7 +3033,7 @@ Hosts *[]*string
A set of Couchbase URIs to connect to. Must use `couchbases://` scheme if `tls` is `true`.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#hosts DatabaseSecretsMount#hosts}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#hosts DatabaseSecretsMount#hosts}
---
@@ -3029,7 +3047,7 @@ Name *string
Name of the database connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
---
@@ -3043,7 +3061,7 @@ Password *string
Specifies the password corresponding to the given username.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
---
@@ -3057,7 +3075,7 @@ Username *string
Specifies the username for Vault to use.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
---
@@ -3071,7 +3089,7 @@ AllowedRoles *[]*string
A list of roles that are allowed to use this connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
---
@@ -3087,7 +3105,7 @@ Required if `tls` is `true`.
Specifies the certificate authority of the Couchbase server, as a PEM certificate that has been base64 encoded.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#base64_pem DatabaseSecretsMount#base64_pem}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#base64_pem DatabaseSecretsMount#base64_pem}
---
@@ -3101,7 +3119,7 @@ BucketName *string
Required for Couchbase versions prior to 6.5.0. This is only used to verify vault's connection to the server.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#bucket_name DatabaseSecretsMount#bucket_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#bucket_name DatabaseSecretsMount#bucket_name}
---
@@ -3115,7 +3133,7 @@ Data *map[string]*string
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
---
@@ -3129,7 +3147,7 @@ InsecureTls interface{}
Specifies whether to skip verification of the server certificate when using TLS.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls}
---
@@ -3145,7 +3163,7 @@ Specifies the name of the plugin to use for this connection.
Must be prefixed with the name of one of the supported database engine types.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
---
@@ -3159,7 +3177,7 @@ RootRotationStatements *[]*string
A list of database statements to be executed to rotate the root user's credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
---
@@ -3173,7 +3191,7 @@ Tls interface{}
Specifies whether to use TLS when connecting to Couchbase.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls}
---
@@ -3187,7 +3205,7 @@ UsernameTemplate *string
Template describing how dynamic usernames are generated.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
---
@@ -3201,7 +3219,7 @@ VerifyConnection interface{}
Specifies if the connection is verified during initial configuration.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
---
@@ -3265,7 +3283,7 @@ Name *string
Name of the database connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
---
@@ -3279,7 +3297,7 @@ Password *string
The password to be used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
---
@@ -3293,7 +3311,7 @@ Url *string
The URL for Elasticsearch's API.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#url DatabaseSecretsMount#url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#url DatabaseSecretsMount#url}
---
@@ -3307,7 +3325,7 @@ Username *string
The username to be used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
---
@@ -3321,7 +3339,7 @@ AllowedRoles *[]*string
A list of roles that are allowed to use this connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
---
@@ -3335,7 +3353,7 @@ CaCert *string
The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#ca_cert DatabaseSecretsMount#ca_cert}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#ca_cert DatabaseSecretsMount#ca_cert}
---
@@ -3349,7 +3367,7 @@ CaPath *string
The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#ca_path DatabaseSecretsMount#ca_path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#ca_path DatabaseSecretsMount#ca_path}
---
@@ -3363,7 +3381,7 @@ ClientCert *string
The path to the certificate for the Elasticsearch client to present for communication.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#client_cert DatabaseSecretsMount#client_cert}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#client_cert DatabaseSecretsMount#client_cert}
---
@@ -3377,7 +3395,7 @@ ClientKey *string
The path to the key for the Elasticsearch client to use for communication.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#client_key DatabaseSecretsMount#client_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#client_key DatabaseSecretsMount#client_key}
---
@@ -3391,7 +3409,7 @@ Data *map[string]*string
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
---
@@ -3405,7 +3423,7 @@ Insecure interface{}
Whether to disable certificate verification.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#insecure DatabaseSecretsMount#insecure}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#insecure DatabaseSecretsMount#insecure}
---
@@ -3421,7 +3439,7 @@ Specifies the name of the plugin to use for this connection.
Must be prefixed with the name of one of the supported database engine types.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
---
@@ -3435,7 +3453,7 @@ RootRotationStatements *[]*string
A list of database statements to be executed to rotate the root user's credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
---
@@ -3449,7 +3467,7 @@ TlsServerName *string
This, if set, is used to set the SNI host when connecting via TLS.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls_server_name DatabaseSecretsMount#tls_server_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_server_name DatabaseSecretsMount#tls_server_name}
---
@@ -3463,7 +3481,7 @@ UsernameTemplate *string
Template describing how dynamic usernames are generated.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
---
@@ -3477,7 +3495,7 @@ VerifyConnection interface{}
Specifies if the connection is verified during initial configuration.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
---
@@ -3535,7 +3553,7 @@ Name *string
Name of the database connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
---
@@ -3549,7 +3567,7 @@ AllowedRoles *[]*string
A list of roles that are allowed to use this connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
---
@@ -3563,7 +3581,7 @@ ConnectionUrl *string
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
---
@@ -3577,7 +3595,7 @@ Data *map[string]*string
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
---
@@ -3591,7 +3609,7 @@ DisableEscaping interface{}
Disable special character escaping in username and password.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping}
---
@@ -3605,7 +3623,7 @@ MaxConnectionLifetime *f64
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
---
@@ -3619,7 +3637,7 @@ MaxIdleConnections *f64
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
---
@@ -3633,7 +3651,7 @@ MaxOpenConnections *f64
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
---
@@ -3647,7 +3665,7 @@ Password *string
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
---
@@ -3663,7 +3681,7 @@ Specifies the name of the plugin to use for this connection.
Must be prefixed with the name of one of the supported database engine types.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
---
@@ -3677,7 +3695,7 @@ RootRotationStatements *[]*string
A list of database statements to be executed to rotate the root user's credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
---
@@ -3691,7 +3709,7 @@ Username *string
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
---
@@ -3705,7 +3723,7 @@ VerifyConnection interface{}
Specifies if the connection is verified during initial configuration.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
---
@@ -3769,7 +3787,7 @@ Host *string
Influxdb host to connect to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#host DatabaseSecretsMount#host}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#host DatabaseSecretsMount#host}
---
@@ -3783,7 +3801,7 @@ Name *string
Name of the database connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
---
@@ -3797,7 +3815,7 @@ Password *string
Specifies the password corresponding to the given username.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
---
@@ -3811,7 +3829,7 @@ Username *string
Specifies the username to use for superuser access.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
---
@@ -3825,7 +3843,7 @@ AllowedRoles *[]*string
A list of roles that are allowed to use this connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
---
@@ -3839,7 +3857,7 @@ ConnectTimeout *f64
The number of seconds to use as a connection timeout.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connect_timeout DatabaseSecretsMount#connect_timeout}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connect_timeout DatabaseSecretsMount#connect_timeout}
---
@@ -3853,7 +3871,7 @@ Data *map[string]*string
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
---
@@ -3867,7 +3885,7 @@ InsecureTls interface{}
Whether to skip verification of the server certificate when using TLS.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls}
---
@@ -3883,7 +3901,7 @@ Concatenated PEM blocks containing a certificate and private key;
a certificate, private key, and issuing CA certificate; or just a CA certificate.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#pem_bundle DatabaseSecretsMount#pem_bundle}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#pem_bundle DatabaseSecretsMount#pem_bundle}
---
@@ -3899,7 +3917,7 @@ Specifies JSON containing a certificate and private key;
a certificate, private key, and issuing CA certificate; or just a CA certificate.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#pem_json DatabaseSecretsMount#pem_json}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#pem_json DatabaseSecretsMount#pem_json}
---
@@ -3915,7 +3933,7 @@ Specifies the name of the plugin to use for this connection.
Must be prefixed with the name of one of the supported database engine types.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
---
@@ -3929,7 +3947,7 @@ Port *f64
The transport port to use to connect to Influxdb.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#port DatabaseSecretsMount#port}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#port DatabaseSecretsMount#port}
---
@@ -3943,7 +3961,7 @@ RootRotationStatements *[]*string
A list of database statements to be executed to rotate the root user's credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
---
@@ -3957,7 +3975,7 @@ Tls interface{}
Whether to use TLS when connecting to Influxdb.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls}
---
@@ -3971,7 +3989,7 @@ UsernameTemplate *string
Template describing how dynamic usernames are generated.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
---
@@ -3985,7 +4003,7 @@ VerifyConnection interface{}
Specifies if the connection is verified during initial configuration.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
---
@@ -4043,7 +4061,7 @@ Name *string
Name of the database connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
---
@@ -4057,7 +4075,7 @@ AllowedRoles *[]*string
A list of roles that are allowed to use this connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
---
@@ -4071,7 +4089,7 @@ ConnectionUrl *string
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
---
@@ -4085,7 +4103,7 @@ Data *map[string]*string
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
---
@@ -4099,7 +4117,7 @@ MaxConnectionLifetime *f64
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
---
@@ -4113,7 +4131,7 @@ MaxIdleConnections *f64
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
---
@@ -4127,7 +4145,7 @@ MaxOpenConnections *f64
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
---
@@ -4141,7 +4159,7 @@ Password *string
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
---
@@ -4157,7 +4175,7 @@ Specifies the name of the plugin to use for this connection.
Must be prefixed with the name of one of the supported database engine types.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
---
@@ -4171,7 +4189,7 @@ RootRotationStatements *[]*string
A list of database statements to be executed to rotate the root user's credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
---
@@ -4185,7 +4203,7 @@ Username *string
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
---
@@ -4199,7 +4217,7 @@ UsernameTemplate *string
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
---
@@ -4213,7 +4231,7 @@ VerifyConnection interface{}
Specifies if the connection is verified during initial configuration.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
---
@@ -4263,7 +4281,7 @@ Name *string
Name of the database connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
---
@@ -4277,7 +4295,7 @@ PrivateKey *string
The Private Programmatic API Key used to connect with MongoDB Atlas API.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#private_key DatabaseSecretsMount#private_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#private_key DatabaseSecretsMount#private_key}
---
@@ -4291,7 +4309,7 @@ ProjectId *string
The Project ID the Database User should be created within.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#project_id DatabaseSecretsMount#project_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#project_id DatabaseSecretsMount#project_id}
---
@@ -4305,7 +4323,7 @@ PublicKey *string
The Public Programmatic API Key used to authenticate with the MongoDB Atlas API.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#public_key DatabaseSecretsMount#public_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#public_key DatabaseSecretsMount#public_key}
---
@@ -4319,7 +4337,7 @@ AllowedRoles *[]*string
A list of roles that are allowed to use this connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
---
@@ -4333,7 +4351,7 @@ Data *map[string]*string
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
---
@@ -4349,7 +4367,7 @@ Specifies the name of the plugin to use for this connection.
Must be prefixed with the name of one of the supported database engine types.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
---
@@ -4363,7 +4381,7 @@ RootRotationStatements *[]*string
A list of database statements to be executed to rotate the root user's credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
---
@@ -4377,7 +4395,7 @@ VerifyConnection interface{}
Specifies if the connection is verified during initial configuration.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
---
@@ -4439,7 +4457,7 @@ Name *string
Name of the database connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
---
@@ -4453,7 +4471,7 @@ AllowedRoles *[]*string
A list of roles that are allowed to use this connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
---
@@ -4467,7 +4485,7 @@ ConnectionUrl *string
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
---
@@ -4481,7 +4499,7 @@ ContainedDb interface{}
Set to true when the target is a Contained Database, e.g. AzureSQL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#contained_db DatabaseSecretsMount#contained_db}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#contained_db DatabaseSecretsMount#contained_db}
---
@@ -4495,7 +4513,7 @@ Data *map[string]*string
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
---
@@ -4509,7 +4527,7 @@ DisableEscaping interface{}
Disable special character escaping in username and password.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping}
---
@@ -4523,7 +4541,7 @@ MaxConnectionLifetime *f64
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
---
@@ -4537,7 +4555,7 @@ MaxIdleConnections *f64
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
---
@@ -4551,7 +4569,7 @@ MaxOpenConnections *f64
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
---
@@ -4565,7 +4583,7 @@ Password *string
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
---
@@ -4581,7 +4599,7 @@ Specifies the name of the plugin to use for this connection.
Must be prefixed with the name of one of the supported database engine types.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
---
@@ -4595,7 +4613,7 @@ RootRotationStatements *[]*string
A list of database statements to be executed to rotate the root user's credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
---
@@ -4609,7 +4627,7 @@ Username *string
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
---
@@ -4623,7 +4641,7 @@ UsernameTemplate *string
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
---
@@ -4637,7 +4655,7 @@ VerifyConnection interface{}
Specifies if the connection is verified during initial configuration.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
---
@@ -4703,7 +4721,7 @@ Name *string
Name of the database connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
---
@@ -4717,7 +4735,7 @@ AllowedRoles *[]*string
A list of roles that are allowed to use this connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
---
@@ -4731,7 +4749,7 @@ AuthType *string
Specify alternative authorization type. (Only 'gcp_iam' is valid currently).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type}
---
@@ -4745,7 +4763,7 @@ ConnectionUrl *string
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
---
@@ -4759,7 +4777,7 @@ Data *map[string]*string
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
---
@@ -4773,7 +4791,7 @@ MaxConnectionLifetime *f64
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
---
@@ -4787,7 +4805,7 @@ MaxIdleConnections *f64
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
---
@@ -4801,7 +4819,7 @@ MaxOpenConnections *f64
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
---
@@ -4815,7 +4833,7 @@ Password *string
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
---
@@ -4831,7 +4849,7 @@ Specifies the name of the plugin to use for this connection.
Must be prefixed with the name of one of the supported database engine types.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
---
@@ -4845,7 +4863,7 @@ RootRotationStatements *[]*string
A list of database statements to be executed to rotate the root user's credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
---
@@ -4859,7 +4877,7 @@ ServiceAccountJson *string
A JSON encoded credential for use with IAM authorization.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json}
---
@@ -4873,7 +4891,7 @@ TlsCa *string
x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca}
---
@@ -4889,7 +4907,7 @@ x509 certificate for connecting to the database.
This must be a PEM encoded version of the private key and the certificate combined.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key}
---
@@ -4903,7 +4921,7 @@ Username *string
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
---
@@ -4917,7 +4935,7 @@ UsernameTemplate *string
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
---
@@ -4931,7 +4949,7 @@ VerifyConnection interface{}
Specifies if the connection is verified during initial configuration.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
---
@@ -4997,7 +5015,7 @@ Name *string
Name of the database connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
---
@@ -5011,7 +5029,7 @@ AllowedRoles *[]*string
A list of roles that are allowed to use this connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
---
@@ -5025,7 +5043,7 @@ AuthType *string
Specify alternative authorization type. (Only 'gcp_iam' is valid currently).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type}
---
@@ -5039,7 +5057,7 @@ ConnectionUrl *string
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
---
@@ -5053,7 +5071,7 @@ Data *map[string]*string
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
---
@@ -5067,7 +5085,7 @@ MaxConnectionLifetime *f64
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
---
@@ -5081,7 +5099,7 @@ MaxIdleConnections *f64
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
---
@@ -5095,7 +5113,7 @@ MaxOpenConnections *f64
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
---
@@ -5109,7 +5127,7 @@ Password *string
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
---
@@ -5125,7 +5143,7 @@ Specifies the name of the plugin to use for this connection.
Must be prefixed with the name of one of the supported database engine types.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
---
@@ -5139,7 +5157,7 @@ RootRotationStatements *[]*string
A list of database statements to be executed to rotate the root user's credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
---
@@ -5153,7 +5171,7 @@ ServiceAccountJson *string
A JSON encoded credential for use with IAM authorization.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json}
---
@@ -5167,7 +5185,7 @@ TlsCa *string
x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca}
---
@@ -5183,7 +5201,7 @@ x509 certificate for connecting to the database.
This must be a PEM encoded version of the private key and the certificate combined.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key}
---
@@ -5197,7 +5215,7 @@ Username *string
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
---
@@ -5211,7 +5229,7 @@ UsernameTemplate *string
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
---
@@ -5225,7 +5243,7 @@ VerifyConnection interface{}
Specifies if the connection is verified during initial configuration.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
---
@@ -5291,7 +5309,7 @@ Name *string
Name of the database connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
---
@@ -5305,7 +5323,7 @@ AllowedRoles *[]*string
A list of roles that are allowed to use this connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
---
@@ -5319,7 +5337,7 @@ AuthType *string
Specify alternative authorization type. (Only 'gcp_iam' is valid currently).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type}
---
@@ -5333,7 +5351,7 @@ ConnectionUrl *string
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
---
@@ -5347,7 +5365,7 @@ Data *map[string]*string
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
---
@@ -5361,7 +5379,7 @@ MaxConnectionLifetime *f64
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
---
@@ -5375,7 +5393,7 @@ MaxIdleConnections *f64
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
---
@@ -5389,7 +5407,7 @@ MaxOpenConnections *f64
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
---
@@ -5403,7 +5421,7 @@ Password *string
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
---
@@ -5419,7 +5437,7 @@ Specifies the name of the plugin to use for this connection.
Must be prefixed with the name of one of the supported database engine types.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
---
@@ -5433,7 +5451,7 @@ RootRotationStatements *[]*string
A list of database statements to be executed to rotate the root user's credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
---
@@ -5447,7 +5465,7 @@ ServiceAccountJson *string
A JSON encoded credential for use with IAM authorization.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json}
---
@@ -5461,7 +5479,7 @@ TlsCa *string
x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca}
---
@@ -5477,7 +5495,7 @@ x509 certificate for connecting to the database.
This must be a PEM encoded version of the private key and the certificate combined.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key}
---
@@ -5491,7 +5509,7 @@ Username *string
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
---
@@ -5505,7 +5523,7 @@ UsernameTemplate *string
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
---
@@ -5519,7 +5537,7 @@ VerifyConnection interface{}
Specifies if the connection is verified during initial configuration.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
---
@@ -5585,7 +5603,7 @@ Name *string
Name of the database connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
---
@@ -5599,7 +5617,7 @@ AllowedRoles *[]*string
A list of roles that are allowed to use this connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
---
@@ -5613,7 +5631,7 @@ AuthType *string
Specify alternative authorization type. (Only 'gcp_iam' is valid currently).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type}
---
@@ -5627,7 +5645,7 @@ ConnectionUrl *string
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
---
@@ -5641,7 +5659,7 @@ Data *map[string]*string
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
---
@@ -5655,7 +5673,7 @@ MaxConnectionLifetime *f64
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
---
@@ -5669,7 +5687,7 @@ MaxIdleConnections *f64
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
---
@@ -5683,7 +5701,7 @@ MaxOpenConnections *f64
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
---
@@ -5697,7 +5715,7 @@ Password *string
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
---
@@ -5713,7 +5731,7 @@ Specifies the name of the plugin to use for this connection.
Must be prefixed with the name of one of the supported database engine types.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
---
@@ -5727,7 +5745,7 @@ RootRotationStatements *[]*string
A list of database statements to be executed to rotate the root user's credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
---
@@ -5741,7 +5759,7 @@ ServiceAccountJson *string
A JSON encoded credential for use with IAM authorization.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json}
---
@@ -5755,7 +5773,7 @@ TlsCa *string
x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca}
---
@@ -5771,7 +5789,7 @@ x509 certificate for connecting to the database.
This must be a PEM encoded version of the private key and the certificate combined.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key}
---
@@ -5785,7 +5803,7 @@ Username *string
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
---
@@ -5799,7 +5817,7 @@ UsernameTemplate *string
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
---
@@ -5813,7 +5831,7 @@ VerifyConnection interface{}
Specifies if the connection is verified during initial configuration.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
---
@@ -5875,7 +5893,7 @@ Name *string
Name of the database connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
---
@@ -5889,7 +5907,7 @@ AllowedRoles *[]*string
A list of roles that are allowed to use this connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
---
@@ -5903,7 +5921,7 @@ ConnectionUrl *string
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
---
@@ -5917,7 +5935,7 @@ Data *map[string]*string
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
---
@@ -5931,7 +5949,7 @@ DisconnectSessions interface{}
Set to true to disconnect any open sessions prior to running the revocation statements.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#disconnect_sessions DatabaseSecretsMount#disconnect_sessions}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#disconnect_sessions DatabaseSecretsMount#disconnect_sessions}
---
@@ -5945,7 +5963,7 @@ MaxConnectionLifetime *f64
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
---
@@ -5959,7 +5977,7 @@ MaxIdleConnections *f64
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
---
@@ -5973,7 +5991,7 @@ MaxOpenConnections *f64
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
---
@@ -5987,7 +6005,7 @@ Password *string
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
---
@@ -6003,7 +6021,7 @@ Specifies the name of the plugin to use for this connection.
Must be prefixed with the name of one of the supported database engine types.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
---
@@ -6017,7 +6035,7 @@ RootRotationStatements *[]*string
A list of database statements to be executed to rotate the root user's credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
---
@@ -6031,7 +6049,7 @@ SplitStatements interface{}
Set to true in order to split statements after semi-colons.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#split_statements DatabaseSecretsMount#split_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#split_statements DatabaseSecretsMount#split_statements}
---
@@ -6045,7 +6063,7 @@ Username *string
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
---
@@ -6059,7 +6077,7 @@ UsernameTemplate *string
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
---
@@ -6073,7 +6091,7 @@ VerifyConnection interface{}
Specifies if the connection is verified during initial configuration.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
---
@@ -6096,8 +6114,12 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretsmount"
MaxOpenConnections: *f64,
Password: *string,
PluginName: *string,
+ PrivateKey: *string,
RootRotationStatements: *[]*string,
+ SelfManaged: interface{},
ServiceAccountJson: *string,
+ TlsCa: *string,
+ TlsCertificate: *string,
Username: *string,
UsernameTemplate: *string,
VerifyConnection: interface{},
@@ -6119,8 +6141,12 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretsmount"
| MaxOpenConnections
| *f64
| Maximum number of open connections to the database. |
| Password
| *string
| The root credential password used in the connection URL. |
| PluginName
| *string
| Specifies the name of the plugin to use for this connection. |
+| PrivateKey
| *string
| The secret key used for the x509 client certificate. Must be PEM encoded. |
| RootRotationStatements
| *[]*string
| A list of database statements to be executed to rotate the root user's credentials. |
+| SelfManaged
| interface{}
| If set, allows onboarding static roles with a rootless connection configuration. |
| ServiceAccountJson
| *string
| A JSON encoded credential for use with IAM authorization. |
+| TlsCa
| *string
| The x509 CA file for validating the certificate presented by the PostgreSQL server. Must be PEM encoded. |
+| TlsCertificate
| *string
| The x509 client certificate for connecting to the database. Must be PEM encoded. |
| Username
| *string
| The root credential username used in the connection URL. |
| UsernameTemplate
| *string
| Username generation template. |
| VerifyConnection
| interface{}
| Specifies if the connection is verified during initial configuration. |
@@ -6137,7 +6163,7 @@ Name *string
Name of the database connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
---
@@ -6151,7 +6177,7 @@ AllowedRoles *[]*string
A list of roles that are allowed to use this connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
---
@@ -6165,7 +6191,7 @@ AuthType *string
Specify alternative authorization type. (Only 'gcp_iam' is valid currently).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type}
---
@@ -6179,7 +6205,7 @@ ConnectionUrl *string
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
---
@@ -6193,7 +6219,7 @@ Data *map[string]*string
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
---
@@ -6207,7 +6233,7 @@ DisableEscaping interface{}
Disable special character escaping in username and password.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping}
---
@@ -6221,7 +6247,7 @@ MaxConnectionLifetime *f64
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
---
@@ -6235,7 +6261,7 @@ MaxIdleConnections *f64
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
---
@@ -6249,7 +6275,7 @@ MaxOpenConnections *f64
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
---
@@ -6263,7 +6289,7 @@ Password *string
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
---
@@ -6279,7 +6305,21 @@ Specifies the name of the plugin to use for this connection.
Must be prefixed with the name of one of the supported database engine types.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
+
+---
+
+##### `PrivateKey`Optional
+
+```go
+PrivateKey *string
+```
+
+- *Type:* *string
+
+The secret key used for the x509 client certificate. Must be PEM encoded.
+
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#private_key DatabaseSecretsMount#private_key}
---
@@ -6293,7 +6333,21 @@ RootRotationStatements *[]*string
A list of database statements to be executed to rotate the root user's credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
+
+---
+
+##### `SelfManaged`Optional
+
+```go
+SelfManaged interface{}
+```
+
+- *Type:* interface{}
+
+If set, allows onboarding static roles with a rootless connection configuration.
+
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#self_managed DatabaseSecretsMount#self_managed}
---
@@ -6307,7 +6361,35 @@ ServiceAccountJson *string
A JSON encoded credential for use with IAM authorization.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json}
+
+---
+
+##### `TlsCa`Optional
+
+```go
+TlsCa *string
+```
+
+- *Type:* *string
+
+The x509 CA file for validating the certificate presented by the PostgreSQL server. Must be PEM encoded.
+
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca}
+
+---
+
+##### `TlsCertificate`Optional
+
+```go
+TlsCertificate *string
+```
+
+- *Type:* *string
+
+The x509 client certificate for connecting to the database. Must be PEM encoded.
+
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_certificate DatabaseSecretsMount#tls_certificate}
---
@@ -6321,7 +6403,7 @@ Username *string
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
---
@@ -6335,7 +6417,7 @@ UsernameTemplate *string
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
---
@@ -6349,7 +6431,7 @@ VerifyConnection interface{}
Specifies if the connection is verified during initial configuration.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
---
@@ -6407,7 +6489,7 @@ Host *string
Specifies the host to connect to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#host DatabaseSecretsMount#host}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#host DatabaseSecretsMount#host}
---
@@ -6421,7 +6503,7 @@ Name *string
Name of the database connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
---
@@ -6435,7 +6517,7 @@ Password *string
Specifies the password corresponding to the given username.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
---
@@ -6449,7 +6531,7 @@ Username *string
Specifies the username for Vault to use.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
---
@@ -6463,7 +6545,7 @@ AllowedRoles *[]*string
A list of roles that are allowed to use this connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
---
@@ -6477,7 +6559,7 @@ CaCert *string
The contents of a PEM-encoded CA cert file to use to verify the Redis server's identity.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#ca_cert DatabaseSecretsMount#ca_cert}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#ca_cert DatabaseSecretsMount#ca_cert}
---
@@ -6491,7 +6573,7 @@ Data *map[string]*string
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
---
@@ -6505,7 +6587,7 @@ InsecureTls interface{}
Specifies whether to skip verification of the server certificate when using TLS.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls}
---
@@ -6521,7 +6603,7 @@ Specifies the name of the plugin to use for this connection.
Must be prefixed with the name of one of the supported database engine types.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
---
@@ -6535,7 +6617,7 @@ Port *f64
The transport port to use to connect to Redis.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#port DatabaseSecretsMount#port}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#port DatabaseSecretsMount#port}
---
@@ -6549,7 +6631,7 @@ RootRotationStatements *[]*string
A list of database statements to be executed to rotate the root user's credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
---
@@ -6563,7 +6645,7 @@ Tls interface{}
Specifies whether to use TLS when connecting to Redis.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls}
---
@@ -6577,7 +6659,7 @@ VerifyConnection interface{}
Specifies if the connection is verified during initial configuration.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
---
@@ -6629,7 +6711,7 @@ Name *string
Name of the database connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
---
@@ -6643,7 +6725,7 @@ Url *string
The configuration endpoint for the ElastiCache cluster to connect to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#url DatabaseSecretsMount#url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#url DatabaseSecretsMount#url}
---
@@ -6657,7 +6739,7 @@ AllowedRoles *[]*string
A list of roles that are allowed to use this connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
---
@@ -6671,7 +6753,7 @@ Data *map[string]*string
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
---
@@ -6687,7 +6769,7 @@ The AWS secret key id to use to talk to ElastiCache.
If omitted the credentials chain provider is used instead.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
---
@@ -6703,7 +6785,7 @@ Specifies the name of the plugin to use for this connection.
Must be prefixed with the name of one of the supported database engine types.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
---
@@ -6719,7 +6801,7 @@ The AWS region where the ElastiCache cluster is hosted.
If omitted the plugin tries to infer the region from the environment.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#region DatabaseSecretsMount#region}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#region DatabaseSecretsMount#region}
---
@@ -6733,7 +6815,7 @@ RootRotationStatements *[]*string
A list of database statements to be executed to rotate the root user's credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
---
@@ -6749,7 +6831,7 @@ The AWS access key id to use to talk to ElastiCache.
If omitted the credentials chain provider is used instead.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
---
@@ -6763,7 +6845,7 @@ VerifyConnection interface{}
Specifies if the connection is verified during initial configuration.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
---
@@ -6823,7 +6905,7 @@ Name *string
Name of the database connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
---
@@ -6837,7 +6919,7 @@ AllowedRoles *[]*string
A list of roles that are allowed to use this connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
---
@@ -6851,7 +6933,7 @@ ConnectionUrl *string
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
---
@@ -6865,7 +6947,7 @@ Data *map[string]*string
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
---
@@ -6879,7 +6961,7 @@ DisableEscaping interface{}
Disable special character escaping in username and password.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping}
---
@@ -6893,7 +6975,7 @@ MaxConnectionLifetime *f64
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
---
@@ -6907,7 +6989,7 @@ MaxIdleConnections *f64
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
---
@@ -6921,7 +7003,7 @@ MaxOpenConnections *f64
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
---
@@ -6935,7 +7017,7 @@ Password *string
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
---
@@ -6951,7 +7033,7 @@ Specifies the name of the plugin to use for this connection.
Must be prefixed with the name of one of the supported database engine types.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
---
@@ -6965,7 +7047,7 @@ RootRotationStatements *[]*string
A list of database statements to be executed to rotate the root user's credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
---
@@ -6979,7 +7061,7 @@ Username *string
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
---
@@ -6993,7 +7075,7 @@ UsernameTemplate *string
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
---
@@ -7007,7 +7089,7 @@ VerifyConnection interface{}
Specifies if the connection is verified during initial configuration.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
---
@@ -7065,7 +7147,7 @@ Name *string
Name of the database connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
---
@@ -7079,7 +7161,7 @@ AllowedRoles *[]*string
A list of roles that are allowed to use this connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
---
@@ -7093,7 +7175,7 @@ ConnectionUrl *string
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
---
@@ -7107,7 +7189,7 @@ Data *map[string]*string
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
---
@@ -7121,7 +7203,7 @@ MaxConnectionLifetime *f64
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
---
@@ -7135,7 +7217,7 @@ MaxIdleConnections *f64
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
---
@@ -7149,7 +7231,7 @@ MaxOpenConnections *f64
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
---
@@ -7163,7 +7245,7 @@ Password *string
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
---
@@ -7179,7 +7261,7 @@ Specifies the name of the plugin to use for this connection.
Must be prefixed with the name of one of the supported database engine types.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
---
@@ -7193,7 +7275,7 @@ RootRotationStatements *[]*string
A list of database statements to be executed to rotate the root user's credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
---
@@ -7207,7 +7289,7 @@ Username *string
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
---
@@ -7221,7 +7303,7 @@ UsernameTemplate *string
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
---
@@ -7235,7 +7317,7 @@ VerifyConnection interface{}
Specifies if the connection is verified during initial configuration.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
---
@@ -7481,6 +7563,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it
| ResetPort
| *No description.* |
| ResetProtocolVersion
| *No description.* |
| ResetRootRotationStatements
| *No description.* |
+| ResetSkipVerification
| *No description.* |
| ResetTls
| *No description.* |
| ResetUsername
| *No description.* |
| ResetVerifyConnection
| *No description.* |
@@ -7709,6 +7792,12 @@ func ResetProtocolVersion()
func ResetRootRotationStatements()
```
+##### `ResetSkipVerification`
+
+```go
+func ResetSkipVerification()
+```
+
##### `ResetTls`
```go
@@ -7747,6 +7836,7 @@ func ResetVerifyConnection()
| PortInput
| *f64
| *No description.* |
| ProtocolVersionInput
| *f64
| *No description.* |
| RootRotationStatementsInput
| *[]*string
| *No description.* |
+| SkipVerificationInput
| interface{}
| *No description.* |
| TlsInput
| interface{}
| *No description.* |
| UsernameInput
| *string
| *No description.* |
| VerifyConnectionInput
| interface{}
| *No description.* |
@@ -7763,6 +7853,7 @@ func ResetVerifyConnection()
| Port
| *f64
| *No description.* |
| ProtocolVersion
| *f64
| *No description.* |
| RootRotationStatements
| *[]*string
| *No description.* |
+| SkipVerification
| interface{}
| *No description.* |
| Tls
| interface{}
| *No description.* |
| Username
| *string
| *No description.* |
| VerifyConnection
| interface{}
| *No description.* |
@@ -7924,6 +8015,16 @@ func RootRotationStatementsInput() *[]*string
---
+##### `SkipVerificationInput`Optional
+
+```go
+func SkipVerificationInput() interface{}
+```
+
+- *Type:* interface{}
+
+---
+
##### `TlsInput`Optional
```go
@@ -8084,6 +8185,16 @@ func RootRotationStatements() *[]*string
---
+##### `SkipVerification`Required
+
+```go
+func SkipVerification() interface{}
+```
+
+- *Type:* interface{}
+
+---
+
##### `Tls`Required
```go
@@ -18510,8 +18621,12 @@ whether the list is wrapping a set (will add tolist() to be able to access an it
| ResetMaxOpenConnections
| *No description.* |
| ResetPassword
| *No description.* |
| ResetPluginName
| *No description.* |
+| ResetPrivateKey
| *No description.* |
| ResetRootRotationStatements
| *No description.* |
+| ResetSelfManaged
| *No description.* |
| ResetServiceAccountJson
| *No description.* |
+| ResetTlsCa
| *No description.* |
+| ResetTlsCertificate
| *No description.* |
| ResetUsername
| *No description.* |
| ResetUsernameTemplate
| *No description.* |
| ResetVerifyConnection
| *No description.* |
@@ -18728,18 +18843,42 @@ func ResetPassword()
func ResetPluginName()
```
+##### `ResetPrivateKey`
+
+```go
+func ResetPrivateKey()
+```
+
##### `ResetRootRotationStatements`
```go
func ResetRootRotationStatements()
```
+##### `ResetSelfManaged`
+
+```go
+func ResetSelfManaged()
+```
+
##### `ResetServiceAccountJson`
```go
func ResetServiceAccountJson()
```
+##### `ResetTlsCa`
+
+```go
+func ResetTlsCa()
+```
+
+##### `ResetTlsCertificate`
+
+```go
+func ResetTlsCertificate()
+```
+
##### `ResetUsername`
```go
@@ -18776,8 +18915,12 @@ func ResetVerifyConnection()
| NameInput
| *string
| *No description.* |
| PasswordInput
| *string
| *No description.* |
| PluginNameInput
| *string
| *No description.* |
+| PrivateKeyInput
| *string
| *No description.* |
| RootRotationStatementsInput
| *[]*string
| *No description.* |
+| SelfManagedInput
| interface{}
| *No description.* |
| ServiceAccountJsonInput
| *string
| *No description.* |
+| TlsCaInput
| *string
| *No description.* |
+| TlsCertificateInput
| *string
| *No description.* |
| UsernameInput
| *string
| *No description.* |
| UsernameTemplateInput
| *string
| *No description.* |
| VerifyConnectionInput
| interface{}
| *No description.* |
@@ -18792,8 +18935,12 @@ func ResetVerifyConnection()
| Name
| *string
| *No description.* |
| Password
| *string
| *No description.* |
| PluginName
| *string
| *No description.* |
+| PrivateKey
| *string
| *No description.* |
| RootRotationStatements
| *[]*string
| *No description.* |
+| SelfManaged
| interface{}
| *No description.* |
| ServiceAccountJson
| *string
| *No description.* |
+| TlsCa
| *string
| *No description.* |
+| TlsCertificate
| *string
| *No description.* |
| Username
| *string
| *No description.* |
| UsernameTemplate
| *string
| *No description.* |
| VerifyConnection
| interface{}
| *No description.* |
@@ -18935,6 +19082,16 @@ func PluginNameInput() *string
---
+##### `PrivateKeyInput`Optional
+
+```go
+func PrivateKeyInput() *string
+```
+
+- *Type:* *string
+
+---
+
##### `RootRotationStatementsInput`Optional
```go
@@ -18945,6 +19102,16 @@ func RootRotationStatementsInput() *[]*string
---
+##### `SelfManagedInput`Optional
+
+```go
+func SelfManagedInput() interface{}
+```
+
+- *Type:* interface{}
+
+---
+
##### `ServiceAccountJsonInput`Optional
```go
@@ -18955,6 +19122,26 @@ func ServiceAccountJsonInput() *string
---
+##### `TlsCaInput`Optional
+
+```go
+func TlsCaInput() *string
+```
+
+- *Type:* *string
+
+---
+
+##### `TlsCertificateInput`Optional
+
+```go
+func TlsCertificateInput() *string
+```
+
+- *Type:* *string
+
+---
+
##### `UsernameInput`Optional
```go
@@ -19095,6 +19282,16 @@ func PluginName() *string
---
+##### `PrivateKey`Required
+
+```go
+func PrivateKey() *string
+```
+
+- *Type:* *string
+
+---
+
##### `RootRotationStatements`Required
```go
@@ -19105,6 +19302,16 @@ func RootRotationStatements() *[]*string
---
+##### `SelfManaged`Required
+
+```go
+func SelfManaged() interface{}
+```
+
+- *Type:* interface{}
+
+---
+
##### `ServiceAccountJson`Required
```go
@@ -19115,6 +19322,26 @@ func ServiceAccountJson() *string
---
+##### `TlsCa`Required
+
+```go
+func TlsCa() *string
+```
+
+- *Type:* *string
+
+---
+
+##### `TlsCertificate`Required
+
+```go
+func TlsCertificate() *string
+```
+
+- *Type:* *string
+
+---
+
##### `Username`Required
```go
diff --git a/docs/databaseSecretsMount.java.md b/docs/databaseSecretsMount.java.md
index 463cb952..84386fde 100644
--- a/docs/databaseSecretsMount.java.md
+++ b/docs/databaseSecretsMount.java.md
@@ -4,7 +4,7 @@
### DatabaseSecretsMount
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount vault_database_secrets_mount}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount vault_database_secrets_mount}.
#### Initializers
@@ -108,7 +108,7 @@ DatabaseSecretsMount.Builder.create(Construct scope, java.lang.String id)
| elasticsearch
| com.hashicorp.cdktf.IResolvable OR java.util.List<DatabaseSecretsMountElasticsearch>
| elasticsearch block. |
| externalEntropyAccess
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| Enable the secrets engine to access Vault's external entropy source. |
| hana
| com.hashicorp.cdktf.IResolvable OR java.util.List<DatabaseSecretsMountHana>
| hana block. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#id DatabaseSecretsMount#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#id DatabaseSecretsMount#id}. |
| identityTokenKey
| java.lang.String
| The key to use for signing plugin workload identity tokens. |
| influxdb
| com.hashicorp.cdktf.IResolvable OR java.util.List<DatabaseSecretsMountInfluxdb>
| influxdb block. |
| listingVisibility
| java.lang.String
| Specifies whether to show this mount in the UI-specific listing endpoint. |
@@ -201,7 +201,7 @@ Must be unique amongst siblings in the same scope
Where the secret backend will be mounted.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#path DatabaseSecretsMount#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#path DatabaseSecretsMount#path}
---
@@ -211,7 +211,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
List of managed key registry entry names that the mount in question is allowed to access.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_managed_keys DatabaseSecretsMount#allowed_managed_keys}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_managed_keys DatabaseSecretsMount#allowed_managed_keys}
---
@@ -221,7 +221,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
List of headers to allow and pass from the request to the plugin.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_response_headers DatabaseSecretsMount#allowed_response_headers}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_response_headers DatabaseSecretsMount#allowed_response_headers}
---
@@ -231,7 +231,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#audit_non_hmac_request_keys DatabaseSecretsMount#audit_non_hmac_request_keys}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#audit_non_hmac_request_keys DatabaseSecretsMount#audit_non_hmac_request_keys}
---
@@ -241,7 +241,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#audit_non_hmac_response_keys DatabaseSecretsMount#audit_non_hmac_response_keys}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#audit_non_hmac_response_keys DatabaseSecretsMount#audit_non_hmac_response_keys}
---
@@ -251,7 +251,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
cassandra block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#cassandra DatabaseSecretsMount#cassandra}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#cassandra DatabaseSecretsMount#cassandra}
---
@@ -261,7 +261,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
couchbase block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#couchbase DatabaseSecretsMount#couchbase}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#couchbase DatabaseSecretsMount#couchbase}
---
@@ -271,7 +271,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Default lease duration for tokens and secrets in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#default_lease_ttl_seconds DatabaseSecretsMount#default_lease_ttl_seconds}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#default_lease_ttl_seconds DatabaseSecretsMount#default_lease_ttl_seconds}
---
@@ -281,7 +281,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
List of headers to allow and pass from the request to the plugin.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#delegated_auth_accessors DatabaseSecretsMount#delegated_auth_accessors}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#delegated_auth_accessors DatabaseSecretsMount#delegated_auth_accessors}
---
@@ -291,7 +291,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Human-friendly description of the mount.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#description DatabaseSecretsMount#description}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#description DatabaseSecretsMount#description}
---
@@ -301,7 +301,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
elasticsearch block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#elasticsearch DatabaseSecretsMount#elasticsearch}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#elasticsearch DatabaseSecretsMount#elasticsearch}
---
@@ -311,7 +311,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Enable the secrets engine to access Vault's external entropy source.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#external_entropy_access DatabaseSecretsMount#external_entropy_access}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#external_entropy_access DatabaseSecretsMount#external_entropy_access}
---
@@ -321,7 +321,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
hana block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#hana DatabaseSecretsMount#hana}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#hana DatabaseSecretsMount#hana}
---
@@ -329,7 +329,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#id DatabaseSecretsMount#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#id DatabaseSecretsMount#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -342,7 +342,7 @@ If you experience problems setting this value it might not be settable. Please t
The key to use for signing plugin workload identity tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#identity_token_key DatabaseSecretsMount#identity_token_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#identity_token_key DatabaseSecretsMount#identity_token_key}
---
@@ -352,7 +352,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
influxdb block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#influxdb DatabaseSecretsMount#influxdb}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#influxdb DatabaseSecretsMount#influxdb}
---
@@ -362,7 +362,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Specifies whether to show this mount in the UI-specific listing endpoint.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#listing_visibility DatabaseSecretsMount#listing_visibility}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#listing_visibility DatabaseSecretsMount#listing_visibility}
---
@@ -372,7 +372,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Local mount flag that can be explicitly set to true to enforce local mount in HA environment.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#local DatabaseSecretsMount#local}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#local DatabaseSecretsMount#local}
---
@@ -382,7 +382,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Maximum possible lease duration for tokens and secrets in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_lease_ttl_seconds DatabaseSecretsMount#max_lease_ttl_seconds}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_lease_ttl_seconds DatabaseSecretsMount#max_lease_ttl_seconds}
---
@@ -392,7 +392,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
mongodb block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#mongodb DatabaseSecretsMount#mongodb}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#mongodb DatabaseSecretsMount#mongodb}
---
@@ -402,7 +402,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
mongodbatlas block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#mongodbatlas DatabaseSecretsMount#mongodbatlas}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#mongodbatlas DatabaseSecretsMount#mongodbatlas}
---
@@ -412,7 +412,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
mssql block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#mssql DatabaseSecretsMount#mssql}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#mssql DatabaseSecretsMount#mssql}
---
@@ -422,7 +422,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
mysql block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#mysql DatabaseSecretsMount#mysql}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#mysql DatabaseSecretsMount#mysql}
---
@@ -432,7 +432,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
mysql_aurora block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#mysql_aurora DatabaseSecretsMount#mysql_aurora}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#mysql_aurora DatabaseSecretsMount#mysql_aurora}
---
@@ -442,7 +442,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
mysql_legacy block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#mysql_legacy DatabaseSecretsMount#mysql_legacy}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#mysql_legacy DatabaseSecretsMount#mysql_legacy}
---
@@ -452,7 +452,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
mysql_rds block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#mysql_rds DatabaseSecretsMount#mysql_rds}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#mysql_rds DatabaseSecretsMount#mysql_rds}
---
@@ -462,7 +462,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#namespace DatabaseSecretsMount#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#namespace DatabaseSecretsMount#namespace}
---
@@ -472,7 +472,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Specifies mount type specific options that are passed to the backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#options DatabaseSecretsMount#options}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#options DatabaseSecretsMount#options}
---
@@ -482,7 +482,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
oracle block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#oracle DatabaseSecretsMount#oracle}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#oracle DatabaseSecretsMount#oracle}
---
@@ -492,7 +492,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
List of headers to allow and pass from the request to the plugin.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#passthrough_request_headers DatabaseSecretsMount#passthrough_request_headers}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#passthrough_request_headers DatabaseSecretsMount#passthrough_request_headers}
---
@@ -502,7 +502,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_version DatabaseSecretsMount#plugin_version}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_version DatabaseSecretsMount#plugin_version}
---
@@ -512,7 +512,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
postgresql block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#postgresql DatabaseSecretsMount#postgresql}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#postgresql DatabaseSecretsMount#postgresql}
---
@@ -522,7 +522,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
redis block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#redis DatabaseSecretsMount#redis}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#redis DatabaseSecretsMount#redis}
---
@@ -532,7 +532,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
redis_elasticache block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#redis_elasticache DatabaseSecretsMount#redis_elasticache}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#redis_elasticache DatabaseSecretsMount#redis_elasticache}
---
@@ -542,7 +542,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
redshift block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#redshift DatabaseSecretsMount#redshift}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#redshift DatabaseSecretsMount#redshift}
---
@@ -552,7 +552,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#seal_wrap DatabaseSecretsMount#seal_wrap}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#seal_wrap DatabaseSecretsMount#seal_wrap}
---
@@ -562,7 +562,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
snowflake block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#snowflake DatabaseSecretsMount#snowflake}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#snowflake DatabaseSecretsMount#snowflake}
---
@@ -1475,7 +1475,7 @@ The construct id used in the generated config for the DatabaseSecretsMount to im
The id of the existing DatabaseSecretsMount that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#import import section} in the documentation of this resource for the id to use
---
@@ -2528,6 +2528,8 @@ DatabaseSecretsMountCassandra.builder()
// .port(java.lang.Number)
// .protocolVersion(java.lang.Number)
// .rootRotationStatements(java.util.List)
+// .skipVerification(java.lang.Boolean)
+// .skipVerification(IResolvable)
// .tls(java.lang.Boolean)
// .tls(IResolvable)
// .username(java.lang.String)
@@ -2553,6 +2555,7 @@ DatabaseSecretsMountCassandra.builder()
| port
| java.lang.Number
| The transport port to use to connect to Cassandra. |
| protocolVersion
| java.lang.Number
| The CQL protocol version to use. |
| rootRotationStatements
| java.util.List
| A list of database statements to be executed to rotate the root user's credentials. |
+| skipVerification
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| Skip permissions checks when a connection to Cassandra is first created. |
| tls
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| Whether to use TLS when connecting to Cassandra. |
| username
| java.lang.String
| The username to use when authenticating with Cassandra. |
| verifyConnection
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| Specifies if the connection is verified during initial configuration. |
@@ -2569,7 +2572,7 @@ public java.lang.String getName();
Name of the database connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
---
@@ -2583,7 +2586,7 @@ public java.util.List getAllowedRoles();
A list of roles that are allowed to use this connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
---
@@ -2597,7 +2600,7 @@ public java.lang.Number getConnectTimeout();
The number of seconds to use as a connection timeout.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connect_timeout DatabaseSecretsMount#connect_timeout}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connect_timeout DatabaseSecretsMount#connect_timeout}
---
@@ -2611,7 +2614,7 @@ public java.util.Map getData();
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
---
@@ -2625,7 +2628,7 @@ public java.util.List getHosts();
Cassandra hosts to connect to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#hosts DatabaseSecretsMount#hosts}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#hosts DatabaseSecretsMount#hosts}
---
@@ -2639,7 +2642,7 @@ public java.lang.Object getInsecureTls();
Whether to skip verification of the server certificate when using TLS.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls}
---
@@ -2653,7 +2656,7 @@ public java.lang.String getPassword();
The password to use when authenticating with Cassandra.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
---
@@ -2669,7 +2672,7 @@ Concatenated PEM blocks containing a certificate and private key;
a certificate, private key, and issuing CA certificate; or just a CA certificate.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#pem_bundle DatabaseSecretsMount#pem_bundle}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#pem_bundle DatabaseSecretsMount#pem_bundle}
---
@@ -2685,7 +2688,7 @@ Specifies JSON containing a certificate and private key;
a certificate, private key, and issuing CA certificate; or just a CA certificate.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#pem_json DatabaseSecretsMount#pem_json}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#pem_json DatabaseSecretsMount#pem_json}
---
@@ -2701,7 +2704,7 @@ Specifies the name of the plugin to use for this connection.
Must be prefixed with the name of one of the supported database engine types.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
---
@@ -2715,7 +2718,7 @@ public java.lang.Number getPort();
The transport port to use to connect to Cassandra.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#port DatabaseSecretsMount#port}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#port DatabaseSecretsMount#port}
---
@@ -2729,7 +2732,7 @@ public java.lang.Number getProtocolVersion();
The CQL protocol version to use.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#protocol_version DatabaseSecretsMount#protocol_version}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#protocol_version DatabaseSecretsMount#protocol_version}
---
@@ -2743,7 +2746,23 @@ public java.util.List getRootRotationStatements();
A list of database statements to be executed to rotate the root user's credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
+
+---
+
+##### `skipVerification`Optional
+
+```java
+public java.lang.Object getSkipVerification();
+```
+
+- *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
+
+Skip permissions checks when a connection to Cassandra is first created.
+
+These checks ensure that Vault is able to create roles, but can be resource intensive in clusters with many roles.
+
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#skip_verification DatabaseSecretsMount#skip_verification}
---
@@ -2757,7 +2776,7 @@ public java.lang.Object getTls();
Whether to use TLS when connecting to Cassandra.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls}
---
@@ -2771,7 +2790,7 @@ public java.lang.String getUsername();
The username to use when authenticating with Cassandra.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
---
@@ -2785,7 +2804,7 @@ public java.lang.Object getVerifyConnection();
Specifies if the connection is verified during initial configuration.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
---
@@ -2893,7 +2912,7 @@ DatabaseSecretsMountConfig.builder()
| elasticsearch
| com.hashicorp.cdktf.IResolvable OR java.util.List<DatabaseSecretsMountElasticsearch>
| elasticsearch block. |
| externalEntropyAccess
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| Enable the secrets engine to access Vault's external entropy source. |
| hana
| com.hashicorp.cdktf.IResolvable OR java.util.List<DatabaseSecretsMountHana>
| hana block. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#id DatabaseSecretsMount#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#id DatabaseSecretsMount#id}. |
| identityTokenKey
| java.lang.String
| The key to use for signing plugin workload identity tokens. |
| influxdb
| com.hashicorp.cdktf.IResolvable OR java.util.List<DatabaseSecretsMountInfluxdb>
| influxdb block. |
| listingVisibility
| java.lang.String
| Specifies whether to show this mount in the UI-specific listing endpoint. |
@@ -3000,7 +3019,7 @@ public java.lang.String getPath();
Where the secret backend will be mounted.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#path DatabaseSecretsMount#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#path DatabaseSecretsMount#path}
---
@@ -3014,7 +3033,7 @@ public java.util.List getAllowedManagedKeys();
List of managed key registry entry names that the mount in question is allowed to access.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_managed_keys DatabaseSecretsMount#allowed_managed_keys}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_managed_keys DatabaseSecretsMount#allowed_managed_keys}
---
@@ -3028,7 +3047,7 @@ public java.util.List getAllowedResponseHeaders();
List of headers to allow and pass from the request to the plugin.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_response_headers DatabaseSecretsMount#allowed_response_headers}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_response_headers DatabaseSecretsMount#allowed_response_headers}
---
@@ -3042,7 +3061,7 @@ public java.util.List getAuditNonHmacRequestKeys();
Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#audit_non_hmac_request_keys DatabaseSecretsMount#audit_non_hmac_request_keys}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#audit_non_hmac_request_keys DatabaseSecretsMount#audit_non_hmac_request_keys}
---
@@ -3056,7 +3075,7 @@ public java.util.List getAuditNonHmacResponseKeys();
Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#audit_non_hmac_response_keys DatabaseSecretsMount#audit_non_hmac_response_keys}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#audit_non_hmac_response_keys DatabaseSecretsMount#audit_non_hmac_response_keys}
---
@@ -3070,7 +3089,7 @@ public java.lang.Object getCassandra();
cassandra block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#cassandra DatabaseSecretsMount#cassandra}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#cassandra DatabaseSecretsMount#cassandra}
---
@@ -3084,7 +3103,7 @@ public java.lang.Object getCouchbase();
couchbase block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#couchbase DatabaseSecretsMount#couchbase}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#couchbase DatabaseSecretsMount#couchbase}
---
@@ -3098,7 +3117,7 @@ public java.lang.Number getDefaultLeaseTtlSeconds();
Default lease duration for tokens and secrets in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#default_lease_ttl_seconds DatabaseSecretsMount#default_lease_ttl_seconds}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#default_lease_ttl_seconds DatabaseSecretsMount#default_lease_ttl_seconds}
---
@@ -3112,7 +3131,7 @@ public java.util.List getDelegatedAuthAccessors();
List of headers to allow and pass from the request to the plugin.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#delegated_auth_accessors DatabaseSecretsMount#delegated_auth_accessors}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#delegated_auth_accessors DatabaseSecretsMount#delegated_auth_accessors}
---
@@ -3126,7 +3145,7 @@ public java.lang.String getDescription();
Human-friendly description of the mount.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#description DatabaseSecretsMount#description}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#description DatabaseSecretsMount#description}
---
@@ -3140,7 +3159,7 @@ public java.lang.Object getElasticsearch();
elasticsearch block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#elasticsearch DatabaseSecretsMount#elasticsearch}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#elasticsearch DatabaseSecretsMount#elasticsearch}
---
@@ -3154,7 +3173,7 @@ public java.lang.Object getExternalEntropyAccess();
Enable the secrets engine to access Vault's external entropy source.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#external_entropy_access DatabaseSecretsMount#external_entropy_access}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#external_entropy_access DatabaseSecretsMount#external_entropy_access}
---
@@ -3168,7 +3187,7 @@ public java.lang.Object getHana();
hana block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#hana DatabaseSecretsMount#hana}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#hana DatabaseSecretsMount#hana}
---
@@ -3180,7 +3199,7 @@ public java.lang.String getId();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#id DatabaseSecretsMount#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#id DatabaseSecretsMount#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -3197,7 +3216,7 @@ public java.lang.String getIdentityTokenKey();
The key to use for signing plugin workload identity tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#identity_token_key DatabaseSecretsMount#identity_token_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#identity_token_key DatabaseSecretsMount#identity_token_key}
---
@@ -3211,7 +3230,7 @@ public java.lang.Object getInfluxdb();
influxdb block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#influxdb DatabaseSecretsMount#influxdb}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#influxdb DatabaseSecretsMount#influxdb}
---
@@ -3225,7 +3244,7 @@ public java.lang.String getListingVisibility();
Specifies whether to show this mount in the UI-specific listing endpoint.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#listing_visibility DatabaseSecretsMount#listing_visibility}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#listing_visibility DatabaseSecretsMount#listing_visibility}
---
@@ -3239,7 +3258,7 @@ public java.lang.Object getLocal();
Local mount flag that can be explicitly set to true to enforce local mount in HA environment.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#local DatabaseSecretsMount#local}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#local DatabaseSecretsMount#local}
---
@@ -3253,7 +3272,7 @@ public java.lang.Number getMaxLeaseTtlSeconds();
Maximum possible lease duration for tokens and secrets in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_lease_ttl_seconds DatabaseSecretsMount#max_lease_ttl_seconds}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_lease_ttl_seconds DatabaseSecretsMount#max_lease_ttl_seconds}
---
@@ -3267,7 +3286,7 @@ public java.lang.Object getMongodb();
mongodb block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#mongodb DatabaseSecretsMount#mongodb}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#mongodb DatabaseSecretsMount#mongodb}
---
@@ -3281,7 +3300,7 @@ public java.lang.Object getMongodbatlas();
mongodbatlas block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#mongodbatlas DatabaseSecretsMount#mongodbatlas}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#mongodbatlas DatabaseSecretsMount#mongodbatlas}
---
@@ -3295,7 +3314,7 @@ public java.lang.Object getMssql();
mssql block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#mssql DatabaseSecretsMount#mssql}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#mssql DatabaseSecretsMount#mssql}
---
@@ -3309,7 +3328,7 @@ public java.lang.Object getMysql();
mysql block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#mysql DatabaseSecretsMount#mysql}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#mysql DatabaseSecretsMount#mysql}
---
@@ -3323,7 +3342,7 @@ public java.lang.Object getMysqlAurora();
mysql_aurora block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#mysql_aurora DatabaseSecretsMount#mysql_aurora}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#mysql_aurora DatabaseSecretsMount#mysql_aurora}
---
@@ -3337,7 +3356,7 @@ public java.lang.Object getMysqlLegacy();
mysql_legacy block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#mysql_legacy DatabaseSecretsMount#mysql_legacy}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#mysql_legacy DatabaseSecretsMount#mysql_legacy}
---
@@ -3351,7 +3370,7 @@ public java.lang.Object getMysqlRds();
mysql_rds block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#mysql_rds DatabaseSecretsMount#mysql_rds}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#mysql_rds DatabaseSecretsMount#mysql_rds}
---
@@ -3365,7 +3384,7 @@ public java.lang.String getNamespace();
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#namespace DatabaseSecretsMount#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#namespace DatabaseSecretsMount#namespace}
---
@@ -3379,7 +3398,7 @@ public java.util.Map getOptions();
Specifies mount type specific options that are passed to the backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#options DatabaseSecretsMount#options}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#options DatabaseSecretsMount#options}
---
@@ -3393,7 +3412,7 @@ public java.lang.Object getOracle();
oracle block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#oracle DatabaseSecretsMount#oracle}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#oracle DatabaseSecretsMount#oracle}
---
@@ -3407,7 +3426,7 @@ public java.util.List getPassthroughRequestHeaders();
List of headers to allow and pass from the request to the plugin.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#passthrough_request_headers DatabaseSecretsMount#passthrough_request_headers}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#passthrough_request_headers DatabaseSecretsMount#passthrough_request_headers}
---
@@ -3421,7 +3440,7 @@ public java.lang.String getPluginVersion();
Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_version DatabaseSecretsMount#plugin_version}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_version DatabaseSecretsMount#plugin_version}
---
@@ -3435,7 +3454,7 @@ public java.lang.Object getPostgresql();
postgresql block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#postgresql DatabaseSecretsMount#postgresql}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#postgresql DatabaseSecretsMount#postgresql}
---
@@ -3449,7 +3468,7 @@ public java.lang.Object getRedis();
redis block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#redis DatabaseSecretsMount#redis}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#redis DatabaseSecretsMount#redis}
---
@@ -3463,7 +3482,7 @@ public java.lang.Object getRedisElasticache();
redis_elasticache block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#redis_elasticache DatabaseSecretsMount#redis_elasticache}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#redis_elasticache DatabaseSecretsMount#redis_elasticache}
---
@@ -3477,7 +3496,7 @@ public java.lang.Object getRedshift();
redshift block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#redshift DatabaseSecretsMount#redshift}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#redshift DatabaseSecretsMount#redshift}
---
@@ -3491,7 +3510,7 @@ public java.lang.Object getSealWrap();
Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#seal_wrap DatabaseSecretsMount#seal_wrap}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#seal_wrap DatabaseSecretsMount#seal_wrap}
---
@@ -3505,7 +3524,7 @@ public java.lang.Object getSnowflake();
snowflake block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#snowflake DatabaseSecretsMount#snowflake}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#snowflake DatabaseSecretsMount#snowflake}
---
@@ -3568,7 +3587,7 @@ public java.util.List getHosts();
A set of Couchbase URIs to connect to. Must use `couchbases://` scheme if `tls` is `true`.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#hosts DatabaseSecretsMount#hosts}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#hosts DatabaseSecretsMount#hosts}
---
@@ -3582,7 +3601,7 @@ public java.lang.String getName();
Name of the database connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
---
@@ -3596,7 +3615,7 @@ public java.lang.String getPassword();
Specifies the password corresponding to the given username.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
---
@@ -3610,7 +3629,7 @@ public java.lang.String getUsername();
Specifies the username for Vault to use.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
---
@@ -3624,7 +3643,7 @@ public java.util.List getAllowedRoles();
A list of roles that are allowed to use this connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
---
@@ -3640,7 +3659,7 @@ Required if `tls` is `true`.
Specifies the certificate authority of the Couchbase server, as a PEM certificate that has been base64 encoded.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#base64_pem DatabaseSecretsMount#base64_pem}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#base64_pem DatabaseSecretsMount#base64_pem}
---
@@ -3654,7 +3673,7 @@ public java.lang.String getBucketName();
Required for Couchbase versions prior to 6.5.0. This is only used to verify vault's connection to the server.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#bucket_name DatabaseSecretsMount#bucket_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#bucket_name DatabaseSecretsMount#bucket_name}
---
@@ -3668,7 +3687,7 @@ public java.util.Map getData();
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
---
@@ -3682,7 +3701,7 @@ public java.lang.Object getInsecureTls();
Specifies whether to skip verification of the server certificate when using TLS.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls}
---
@@ -3698,7 +3717,7 @@ Specifies the name of the plugin to use for this connection.
Must be prefixed with the name of one of the supported database engine types.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
---
@@ -3712,7 +3731,7 @@ public java.util.List getRootRotationStatements();
A list of database statements to be executed to rotate the root user's credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
---
@@ -3726,7 +3745,7 @@ public java.lang.Object getTls();
Specifies whether to use TLS when connecting to Couchbase.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls}
---
@@ -3740,7 +3759,7 @@ public java.lang.String getUsernameTemplate();
Template describing how dynamic usernames are generated.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
---
@@ -3754,7 +3773,7 @@ public java.lang.Object getVerifyConnection();
Specifies if the connection is verified during initial configuration.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
---
@@ -3820,7 +3839,7 @@ public java.lang.String getName();
Name of the database connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
---
@@ -3834,7 +3853,7 @@ public java.lang.String getPassword();
The password to be used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
---
@@ -3848,7 +3867,7 @@ public java.lang.String getUrl();
The URL for Elasticsearch's API.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#url DatabaseSecretsMount#url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#url DatabaseSecretsMount#url}
---
@@ -3862,7 +3881,7 @@ public java.lang.String getUsername();
The username to be used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
---
@@ -3876,7 +3895,7 @@ public java.util.List getAllowedRoles();
A list of roles that are allowed to use this connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
---
@@ -3890,7 +3909,7 @@ public java.lang.String getCaCert();
The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#ca_cert DatabaseSecretsMount#ca_cert}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#ca_cert DatabaseSecretsMount#ca_cert}
---
@@ -3904,7 +3923,7 @@ public java.lang.String getCaPath();
The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#ca_path DatabaseSecretsMount#ca_path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#ca_path DatabaseSecretsMount#ca_path}
---
@@ -3918,7 +3937,7 @@ public java.lang.String getClientCert();
The path to the certificate for the Elasticsearch client to present for communication.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#client_cert DatabaseSecretsMount#client_cert}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#client_cert DatabaseSecretsMount#client_cert}
---
@@ -3932,7 +3951,7 @@ public java.lang.String getClientKey();
The path to the key for the Elasticsearch client to use for communication.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#client_key DatabaseSecretsMount#client_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#client_key DatabaseSecretsMount#client_key}
---
@@ -3946,7 +3965,7 @@ public java.util.Map getData();
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
---
@@ -3960,7 +3979,7 @@ public java.lang.Object getInsecure();
Whether to disable certificate verification.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#insecure DatabaseSecretsMount#insecure}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#insecure DatabaseSecretsMount#insecure}
---
@@ -3976,7 +3995,7 @@ Specifies the name of the plugin to use for this connection.
Must be prefixed with the name of one of the supported database engine types.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
---
@@ -3990,7 +4009,7 @@ public java.util.List getRootRotationStatements();
A list of database statements to be executed to rotate the root user's credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
---
@@ -4004,7 +4023,7 @@ public java.lang.String getTlsServerName();
This, if set, is used to set the SNI host when connecting via TLS.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls_server_name DatabaseSecretsMount#tls_server_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_server_name DatabaseSecretsMount#tls_server_name}
---
@@ -4018,7 +4037,7 @@ public java.lang.String getUsernameTemplate();
Template describing how dynamic usernames are generated.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
---
@@ -4032,7 +4051,7 @@ public java.lang.Object getVerifyConnection();
Specifies if the connection is verified during initial configuration.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
---
@@ -4092,7 +4111,7 @@ public java.lang.String getName();
Name of the database connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
---
@@ -4106,7 +4125,7 @@ public java.util.List getAllowedRoles();
A list of roles that are allowed to use this connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
---
@@ -4120,7 +4139,7 @@ public java.lang.String getConnectionUrl();
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
---
@@ -4134,7 +4153,7 @@ public java.util.Map getData();
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
---
@@ -4148,7 +4167,7 @@ public java.lang.Object getDisableEscaping();
Disable special character escaping in username and password.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping}
---
@@ -4162,7 +4181,7 @@ public java.lang.Number getMaxConnectionLifetime();
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
---
@@ -4176,7 +4195,7 @@ public java.lang.Number getMaxIdleConnections();
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
---
@@ -4190,7 +4209,7 @@ public java.lang.Number getMaxOpenConnections();
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
---
@@ -4204,7 +4223,7 @@ public java.lang.String getPassword();
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
---
@@ -4220,7 +4239,7 @@ Specifies the name of the plugin to use for this connection.
Must be prefixed with the name of one of the supported database engine types.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
---
@@ -4234,7 +4253,7 @@ public java.util.List getRootRotationStatements();
A list of database statements to be executed to rotate the root user's credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
---
@@ -4248,7 +4267,7 @@ public java.lang.String getUsername();
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
---
@@ -4262,7 +4281,7 @@ public java.lang.Object getVerifyConnection();
Specifies if the connection is verified during initial configuration.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
---
@@ -4329,7 +4348,7 @@ public java.lang.String getHost();
Influxdb host to connect to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#host DatabaseSecretsMount#host}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#host DatabaseSecretsMount#host}
---
@@ -4343,7 +4362,7 @@ public java.lang.String getName();
Name of the database connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
---
@@ -4357,7 +4376,7 @@ public java.lang.String getPassword();
Specifies the password corresponding to the given username.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
---
@@ -4371,7 +4390,7 @@ public java.lang.String getUsername();
Specifies the username to use for superuser access.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
---
@@ -4385,7 +4404,7 @@ public java.util.List getAllowedRoles();
A list of roles that are allowed to use this connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
---
@@ -4399,7 +4418,7 @@ public java.lang.Number getConnectTimeout();
The number of seconds to use as a connection timeout.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connect_timeout DatabaseSecretsMount#connect_timeout}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connect_timeout DatabaseSecretsMount#connect_timeout}
---
@@ -4413,7 +4432,7 @@ public java.util.Map getData();
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
---
@@ -4427,7 +4446,7 @@ public java.lang.Object getInsecureTls();
Whether to skip verification of the server certificate when using TLS.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls}
---
@@ -4443,7 +4462,7 @@ Concatenated PEM blocks containing a certificate and private key;
a certificate, private key, and issuing CA certificate; or just a CA certificate.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#pem_bundle DatabaseSecretsMount#pem_bundle}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#pem_bundle DatabaseSecretsMount#pem_bundle}
---
@@ -4459,7 +4478,7 @@ Specifies JSON containing a certificate and private key;
a certificate, private key, and issuing CA certificate; or just a CA certificate.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#pem_json DatabaseSecretsMount#pem_json}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#pem_json DatabaseSecretsMount#pem_json}
---
@@ -4475,7 +4494,7 @@ Specifies the name of the plugin to use for this connection.
Must be prefixed with the name of one of the supported database engine types.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
---
@@ -4489,7 +4508,7 @@ public java.lang.Number getPort();
The transport port to use to connect to Influxdb.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#port DatabaseSecretsMount#port}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#port DatabaseSecretsMount#port}
---
@@ -4503,7 +4522,7 @@ public java.util.List getRootRotationStatements();
A list of database statements to be executed to rotate the root user's credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
---
@@ -4517,7 +4536,7 @@ public java.lang.Object getTls();
Whether to use TLS when connecting to Influxdb.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls}
---
@@ -4531,7 +4550,7 @@ public java.lang.String getUsernameTemplate();
Template describing how dynamic usernames are generated.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
---
@@ -4545,7 +4564,7 @@ public java.lang.Object getVerifyConnection();
Specifies if the connection is verified during initial configuration.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
---
@@ -4604,7 +4623,7 @@ public java.lang.String getName();
Name of the database connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
---
@@ -4618,7 +4637,7 @@ public java.util.List getAllowedRoles();
A list of roles that are allowed to use this connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
---
@@ -4632,7 +4651,7 @@ public java.lang.String getConnectionUrl();
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
---
@@ -4646,7 +4665,7 @@ public java.util.Map getData();
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
---
@@ -4660,7 +4679,7 @@ public java.lang.Number getMaxConnectionLifetime();
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
---
@@ -4674,7 +4693,7 @@ public java.lang.Number getMaxIdleConnections();
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
---
@@ -4688,7 +4707,7 @@ public java.lang.Number getMaxOpenConnections();
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
---
@@ -4702,7 +4721,7 @@ public java.lang.String getPassword();
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
---
@@ -4718,7 +4737,7 @@ Specifies the name of the plugin to use for this connection.
Must be prefixed with the name of one of the supported database engine types.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
---
@@ -4732,7 +4751,7 @@ public java.util.List getRootRotationStatements();
A list of database statements to be executed to rotate the root user's credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
---
@@ -4746,7 +4765,7 @@ public java.lang.String getUsername();
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
---
@@ -4760,7 +4779,7 @@ public java.lang.String getUsernameTemplate();
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
---
@@ -4774,7 +4793,7 @@ public java.lang.Object getVerifyConnection();
Specifies if the connection is verified during initial configuration.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
---
@@ -4825,7 +4844,7 @@ public java.lang.String getName();
Name of the database connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
---
@@ -4839,7 +4858,7 @@ public java.lang.String getPrivateKey();
The Private Programmatic API Key used to connect with MongoDB Atlas API.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#private_key DatabaseSecretsMount#private_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#private_key DatabaseSecretsMount#private_key}
---
@@ -4853,7 +4872,7 @@ public java.lang.String getProjectId();
The Project ID the Database User should be created within.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#project_id DatabaseSecretsMount#project_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#project_id DatabaseSecretsMount#project_id}
---
@@ -4867,7 +4886,7 @@ public java.lang.String getPublicKey();
The Public Programmatic API Key used to authenticate with the MongoDB Atlas API.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#public_key DatabaseSecretsMount#public_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#public_key DatabaseSecretsMount#public_key}
---
@@ -4881,7 +4900,7 @@ public java.util.List getAllowedRoles();
A list of roles that are allowed to use this connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
---
@@ -4895,7 +4914,7 @@ public java.util.Map getData();
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
---
@@ -4911,7 +4930,7 @@ Specifies the name of the plugin to use for this connection.
Must be prefixed with the name of one of the supported database engine types.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
---
@@ -4925,7 +4944,7 @@ public java.util.List getRootRotationStatements();
A list of database statements to be executed to rotate the root user's credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
---
@@ -4939,7 +4958,7 @@ public java.lang.Object getVerifyConnection();
Specifies if the connection is verified during initial configuration.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
---
@@ -5004,7 +5023,7 @@ public java.lang.String getName();
Name of the database connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
---
@@ -5018,7 +5037,7 @@ public java.util.List getAllowedRoles();
A list of roles that are allowed to use this connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
---
@@ -5032,7 +5051,7 @@ public java.lang.String getConnectionUrl();
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
---
@@ -5046,7 +5065,7 @@ public java.lang.Object getContainedDb();
Set to true when the target is a Contained Database, e.g. AzureSQL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#contained_db DatabaseSecretsMount#contained_db}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#contained_db DatabaseSecretsMount#contained_db}
---
@@ -5060,7 +5079,7 @@ public java.util.Map getData();
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
---
@@ -5074,7 +5093,7 @@ public java.lang.Object getDisableEscaping();
Disable special character escaping in username and password.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping}
---
@@ -5088,7 +5107,7 @@ public java.lang.Number getMaxConnectionLifetime();
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
---
@@ -5102,7 +5121,7 @@ public java.lang.Number getMaxIdleConnections();
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
---
@@ -5116,7 +5135,7 @@ public java.lang.Number getMaxOpenConnections();
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
---
@@ -5130,7 +5149,7 @@ public java.lang.String getPassword();
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
---
@@ -5146,7 +5165,7 @@ Specifies the name of the plugin to use for this connection.
Must be prefixed with the name of one of the supported database engine types.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
---
@@ -5160,7 +5179,7 @@ public java.util.List getRootRotationStatements();
A list of database statements to be executed to rotate the root user's credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
---
@@ -5174,7 +5193,7 @@ public java.lang.String getUsername();
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
---
@@ -5188,7 +5207,7 @@ public java.lang.String getUsernameTemplate();
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
---
@@ -5202,7 +5221,7 @@ public java.lang.Object getVerifyConnection();
Specifies if the connection is verified during initial configuration.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
---
@@ -5269,7 +5288,7 @@ public java.lang.String getName();
Name of the database connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
---
@@ -5283,7 +5302,7 @@ public java.util.List getAllowedRoles();
A list of roles that are allowed to use this connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
---
@@ -5297,7 +5316,7 @@ public java.lang.String getAuthType();
Specify alternative authorization type. (Only 'gcp_iam' is valid currently).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type}
---
@@ -5311,7 +5330,7 @@ public java.lang.String getConnectionUrl();
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
---
@@ -5325,7 +5344,7 @@ public java.util.Map getData();
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
---
@@ -5339,7 +5358,7 @@ public java.lang.Number getMaxConnectionLifetime();
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
---
@@ -5353,7 +5372,7 @@ public java.lang.Number getMaxIdleConnections();
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
---
@@ -5367,7 +5386,7 @@ public java.lang.Number getMaxOpenConnections();
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
---
@@ -5381,7 +5400,7 @@ public java.lang.String getPassword();
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
---
@@ -5397,7 +5416,7 @@ Specifies the name of the plugin to use for this connection.
Must be prefixed with the name of one of the supported database engine types.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
---
@@ -5411,7 +5430,7 @@ public java.util.List getRootRotationStatements();
A list of database statements to be executed to rotate the root user's credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
---
@@ -5425,7 +5444,7 @@ public java.lang.String getServiceAccountJson();
A JSON encoded credential for use with IAM authorization.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json}
---
@@ -5439,7 +5458,7 @@ public java.lang.String getTlsCa();
x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca}
---
@@ -5455,7 +5474,7 @@ x509 certificate for connecting to the database.
This must be a PEM encoded version of the private key and the certificate combined.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key}
---
@@ -5469,7 +5488,7 @@ public java.lang.String getUsername();
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
---
@@ -5483,7 +5502,7 @@ public java.lang.String getUsernameTemplate();
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
---
@@ -5497,7 +5516,7 @@ public java.lang.Object getVerifyConnection();
Specifies if the connection is verified during initial configuration.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
---
@@ -5564,7 +5583,7 @@ public java.lang.String getName();
Name of the database connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
---
@@ -5578,7 +5597,7 @@ public java.util.List getAllowedRoles();
A list of roles that are allowed to use this connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
---
@@ -5592,7 +5611,7 @@ public java.lang.String getAuthType();
Specify alternative authorization type. (Only 'gcp_iam' is valid currently).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type}
---
@@ -5606,7 +5625,7 @@ public java.lang.String getConnectionUrl();
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
---
@@ -5620,7 +5639,7 @@ public java.util.Map getData();
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
---
@@ -5634,7 +5653,7 @@ public java.lang.Number getMaxConnectionLifetime();
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
---
@@ -5648,7 +5667,7 @@ public java.lang.Number getMaxIdleConnections();
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
---
@@ -5662,7 +5681,7 @@ public java.lang.Number getMaxOpenConnections();
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
---
@@ -5676,7 +5695,7 @@ public java.lang.String getPassword();
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
---
@@ -5692,7 +5711,7 @@ Specifies the name of the plugin to use for this connection.
Must be prefixed with the name of one of the supported database engine types.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
---
@@ -5706,7 +5725,7 @@ public java.util.List getRootRotationStatements();
A list of database statements to be executed to rotate the root user's credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
---
@@ -5720,7 +5739,7 @@ public java.lang.String getServiceAccountJson();
A JSON encoded credential for use with IAM authorization.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json}
---
@@ -5734,7 +5753,7 @@ public java.lang.String getTlsCa();
x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca}
---
@@ -5750,7 +5769,7 @@ x509 certificate for connecting to the database.
This must be a PEM encoded version of the private key and the certificate combined.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key}
---
@@ -5764,7 +5783,7 @@ public java.lang.String getUsername();
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
---
@@ -5778,7 +5797,7 @@ public java.lang.String getUsernameTemplate();
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
---
@@ -5792,7 +5811,7 @@ public java.lang.Object getVerifyConnection();
Specifies if the connection is verified during initial configuration.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
---
@@ -5859,7 +5878,7 @@ public java.lang.String getName();
Name of the database connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
---
@@ -5873,7 +5892,7 @@ public java.util.List getAllowedRoles();
A list of roles that are allowed to use this connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
---
@@ -5887,7 +5906,7 @@ public java.lang.String getAuthType();
Specify alternative authorization type. (Only 'gcp_iam' is valid currently).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type}
---
@@ -5901,7 +5920,7 @@ public java.lang.String getConnectionUrl();
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
---
@@ -5915,7 +5934,7 @@ public java.util.Map getData();
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
---
@@ -5929,7 +5948,7 @@ public java.lang.Number getMaxConnectionLifetime();
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
---
@@ -5943,7 +5962,7 @@ public java.lang.Number getMaxIdleConnections();
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
---
@@ -5957,7 +5976,7 @@ public java.lang.Number getMaxOpenConnections();
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
---
@@ -5971,7 +5990,7 @@ public java.lang.String getPassword();
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
---
@@ -5987,7 +6006,7 @@ Specifies the name of the plugin to use for this connection.
Must be prefixed with the name of one of the supported database engine types.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
---
@@ -6001,7 +6020,7 @@ public java.util.List getRootRotationStatements();
A list of database statements to be executed to rotate the root user's credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
---
@@ -6015,7 +6034,7 @@ public java.lang.String getServiceAccountJson();
A JSON encoded credential for use with IAM authorization.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json}
---
@@ -6029,7 +6048,7 @@ public java.lang.String getTlsCa();
x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca}
---
@@ -6045,7 +6064,7 @@ x509 certificate for connecting to the database.
This must be a PEM encoded version of the private key and the certificate combined.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key}
---
@@ -6059,7 +6078,7 @@ public java.lang.String getUsername();
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
---
@@ -6073,7 +6092,7 @@ public java.lang.String getUsernameTemplate();
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
---
@@ -6087,7 +6106,7 @@ public java.lang.Object getVerifyConnection();
Specifies if the connection is verified during initial configuration.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
---
@@ -6154,7 +6173,7 @@ public java.lang.String getName();
Name of the database connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
---
@@ -6168,7 +6187,7 @@ public java.util.List getAllowedRoles();
A list of roles that are allowed to use this connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
---
@@ -6182,7 +6201,7 @@ public java.lang.String getAuthType();
Specify alternative authorization type. (Only 'gcp_iam' is valid currently).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type}
---
@@ -6196,7 +6215,7 @@ public java.lang.String getConnectionUrl();
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
---
@@ -6210,7 +6229,7 @@ public java.util.Map getData();
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
---
@@ -6224,7 +6243,7 @@ public java.lang.Number getMaxConnectionLifetime();
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
---
@@ -6238,7 +6257,7 @@ public java.lang.Number getMaxIdleConnections();
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
---
@@ -6252,7 +6271,7 @@ public java.lang.Number getMaxOpenConnections();
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
---
@@ -6266,7 +6285,7 @@ public java.lang.String getPassword();
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
---
@@ -6282,7 +6301,7 @@ Specifies the name of the plugin to use for this connection.
Must be prefixed with the name of one of the supported database engine types.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
---
@@ -6296,7 +6315,7 @@ public java.util.List getRootRotationStatements();
A list of database statements to be executed to rotate the root user's credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
---
@@ -6310,7 +6329,7 @@ public java.lang.String getServiceAccountJson();
A JSON encoded credential for use with IAM authorization.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json}
---
@@ -6324,7 +6343,7 @@ public java.lang.String getTlsCa();
x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca}
---
@@ -6340,7 +6359,7 @@ x509 certificate for connecting to the database.
This must be a PEM encoded version of the private key and the certificate combined.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key}
---
@@ -6354,7 +6373,7 @@ public java.lang.String getUsername();
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
---
@@ -6368,7 +6387,7 @@ public java.lang.String getUsernameTemplate();
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
---
@@ -6382,7 +6401,7 @@ public java.lang.Object getVerifyConnection();
Specifies if the connection is verified during initial configuration.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
---
@@ -6447,7 +6466,7 @@ public java.lang.String getName();
Name of the database connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
---
@@ -6461,7 +6480,7 @@ public java.util.List getAllowedRoles();
A list of roles that are allowed to use this connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
---
@@ -6475,7 +6494,7 @@ public java.lang.String getConnectionUrl();
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
---
@@ -6489,7 +6508,7 @@ public java.util.Map getData();
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
---
@@ -6503,7 +6522,7 @@ public java.lang.Object getDisconnectSessions();
Set to true to disconnect any open sessions prior to running the revocation statements.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#disconnect_sessions DatabaseSecretsMount#disconnect_sessions}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#disconnect_sessions DatabaseSecretsMount#disconnect_sessions}
---
@@ -6517,7 +6536,7 @@ public java.lang.Number getMaxConnectionLifetime();
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
---
@@ -6531,7 +6550,7 @@ public java.lang.Number getMaxIdleConnections();
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
---
@@ -6545,7 +6564,7 @@ public java.lang.Number getMaxOpenConnections();
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
---
@@ -6559,7 +6578,7 @@ public java.lang.String getPassword();
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
---
@@ -6575,7 +6594,7 @@ Specifies the name of the plugin to use for this connection.
Must be prefixed with the name of one of the supported database engine types.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
---
@@ -6589,7 +6608,7 @@ public java.util.List getRootRotationStatements();
A list of database statements to be executed to rotate the root user's credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
---
@@ -6603,7 +6622,7 @@ public java.lang.Object getSplitStatements();
Set to true in order to split statements after semi-colons.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#split_statements DatabaseSecretsMount#split_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#split_statements DatabaseSecretsMount#split_statements}
---
@@ -6617,7 +6636,7 @@ public java.lang.String getUsername();
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
---
@@ -6631,7 +6650,7 @@ public java.lang.String getUsernameTemplate();
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
---
@@ -6645,7 +6664,7 @@ public java.lang.Object getVerifyConnection();
Specifies if the connection is verified during initial configuration.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
---
@@ -6669,8 +6688,13 @@ DatabaseSecretsMountPostgresql.builder()
// .maxOpenConnections(java.lang.Number)
// .password(java.lang.String)
// .pluginName(java.lang.String)
+// .privateKey(java.lang.String)
// .rootRotationStatements(java.util.List)
+// .selfManaged(java.lang.Boolean)
+// .selfManaged(IResolvable)
// .serviceAccountJson(java.lang.String)
+// .tlsCa(java.lang.String)
+// .tlsCertificate(java.lang.String)
// .username(java.lang.String)
// .usernameTemplate(java.lang.String)
// .verifyConnection(java.lang.Boolean)
@@ -6693,8 +6717,12 @@ DatabaseSecretsMountPostgresql.builder()
| maxOpenConnections
| java.lang.Number
| Maximum number of open connections to the database. |
| password
| java.lang.String
| The root credential password used in the connection URL. |
| pluginName
| java.lang.String
| Specifies the name of the plugin to use for this connection. |
+| privateKey
| java.lang.String
| The secret key used for the x509 client certificate. Must be PEM encoded. |
| rootRotationStatements
| java.util.List
| A list of database statements to be executed to rotate the root user's credentials. |
+| selfManaged
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| If set, allows onboarding static roles with a rootless connection configuration. |
| serviceAccountJson
| java.lang.String
| A JSON encoded credential for use with IAM authorization. |
+| tlsCa
| java.lang.String
| The x509 CA file for validating the certificate presented by the PostgreSQL server. Must be PEM encoded. |
+| tlsCertificate
| java.lang.String
| The x509 client certificate for connecting to the database. Must be PEM encoded. |
| username
| java.lang.String
| The root credential username used in the connection URL. |
| usernameTemplate
| java.lang.String
| Username generation template. |
| verifyConnection
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| Specifies if the connection is verified during initial configuration. |
@@ -6711,7 +6739,7 @@ public java.lang.String getName();
Name of the database connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
---
@@ -6725,7 +6753,7 @@ public java.util.List getAllowedRoles();
A list of roles that are allowed to use this connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
---
@@ -6739,7 +6767,7 @@ public java.lang.String getAuthType();
Specify alternative authorization type. (Only 'gcp_iam' is valid currently).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type}
---
@@ -6753,7 +6781,7 @@ public java.lang.String getConnectionUrl();
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
---
@@ -6767,7 +6795,7 @@ public java.util.Map getData();
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
---
@@ -6781,7 +6809,7 @@ public java.lang.Object getDisableEscaping();
Disable special character escaping in username and password.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping}
---
@@ -6795,7 +6823,7 @@ public java.lang.Number getMaxConnectionLifetime();
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
---
@@ -6809,7 +6837,7 @@ public java.lang.Number getMaxIdleConnections();
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
---
@@ -6823,7 +6851,7 @@ public java.lang.Number getMaxOpenConnections();
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
---
@@ -6837,7 +6865,7 @@ public java.lang.String getPassword();
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
---
@@ -6853,7 +6881,21 @@ Specifies the name of the plugin to use for this connection.
Must be prefixed with the name of one of the supported database engine types.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
+
+---
+
+##### `privateKey`Optional
+
+```java
+public java.lang.String getPrivateKey();
+```
+
+- *Type:* java.lang.String
+
+The secret key used for the x509 client certificate. Must be PEM encoded.
+
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#private_key DatabaseSecretsMount#private_key}
---
@@ -6867,7 +6909,21 @@ public java.util.List getRootRotationStatements();
A list of database statements to be executed to rotate the root user's credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
+
+---
+
+##### `selfManaged`Optional
+
+```java
+public java.lang.Object getSelfManaged();
+```
+
+- *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
+
+If set, allows onboarding static roles with a rootless connection configuration.
+
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#self_managed DatabaseSecretsMount#self_managed}
---
@@ -6881,7 +6937,35 @@ public java.lang.String getServiceAccountJson();
A JSON encoded credential for use with IAM authorization.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json}
+
+---
+
+##### `tlsCa`Optional
+
+```java
+public java.lang.String getTlsCa();
+```
+
+- *Type:* java.lang.String
+
+The x509 CA file for validating the certificate presented by the PostgreSQL server. Must be PEM encoded.
+
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca}
+
+---
+
+##### `tlsCertificate`Optional
+
+```java
+public java.lang.String getTlsCertificate();
+```
+
+- *Type:* java.lang.String
+
+The x509 client certificate for connecting to the database. Must be PEM encoded.
+
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_certificate DatabaseSecretsMount#tls_certificate}
---
@@ -6895,7 +6979,7 @@ public java.lang.String getUsername();
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
---
@@ -6909,7 +6993,7 @@ public java.lang.String getUsernameTemplate();
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
---
@@ -6923,7 +7007,7 @@ public java.lang.Object getVerifyConnection();
Specifies if the connection is verified during initial configuration.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
---
@@ -6984,7 +7068,7 @@ public java.lang.String getHost();
Specifies the host to connect to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#host DatabaseSecretsMount#host}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#host DatabaseSecretsMount#host}
---
@@ -6998,7 +7082,7 @@ public java.lang.String getName();
Name of the database connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
---
@@ -7012,7 +7096,7 @@ public java.lang.String getPassword();
Specifies the password corresponding to the given username.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
---
@@ -7026,7 +7110,7 @@ public java.lang.String getUsername();
Specifies the username for Vault to use.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
---
@@ -7040,7 +7124,7 @@ public java.util.List getAllowedRoles();
A list of roles that are allowed to use this connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
---
@@ -7054,7 +7138,7 @@ public java.lang.String getCaCert();
The contents of a PEM-encoded CA cert file to use to verify the Redis server's identity.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#ca_cert DatabaseSecretsMount#ca_cert}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#ca_cert DatabaseSecretsMount#ca_cert}
---
@@ -7068,7 +7152,7 @@ public java.util.Map getData();
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
---
@@ -7082,7 +7166,7 @@ public java.lang.Object getInsecureTls();
Specifies whether to skip verification of the server certificate when using TLS.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls}
---
@@ -7098,7 +7182,7 @@ Specifies the name of the plugin to use for this connection.
Must be prefixed with the name of one of the supported database engine types.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
---
@@ -7112,7 +7196,7 @@ public java.lang.Number getPort();
The transport port to use to connect to Redis.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#port DatabaseSecretsMount#port}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#port DatabaseSecretsMount#port}
---
@@ -7126,7 +7210,7 @@ public java.util.List getRootRotationStatements();
A list of database statements to be executed to rotate the root user's credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
---
@@ -7140,7 +7224,7 @@ public java.lang.Object getTls();
Specifies whether to use TLS when connecting to Redis.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls}
---
@@ -7154,7 +7238,7 @@ public java.lang.Object getVerifyConnection();
Specifies if the connection is verified during initial configuration.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
---
@@ -7207,7 +7291,7 @@ public java.lang.String getName();
Name of the database connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
---
@@ -7221,7 +7305,7 @@ public java.lang.String getUrl();
The configuration endpoint for the ElastiCache cluster to connect to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#url DatabaseSecretsMount#url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#url DatabaseSecretsMount#url}
---
@@ -7235,7 +7319,7 @@ public java.util.List getAllowedRoles();
A list of roles that are allowed to use this connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
---
@@ -7249,7 +7333,7 @@ public java.util.Map getData();
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
---
@@ -7265,7 +7349,7 @@ The AWS secret key id to use to talk to ElastiCache.
If omitted the credentials chain provider is used instead.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
---
@@ -7281,7 +7365,7 @@ Specifies the name of the plugin to use for this connection.
Must be prefixed with the name of one of the supported database engine types.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
---
@@ -7297,7 +7381,7 @@ The AWS region where the ElastiCache cluster is hosted.
If omitted the plugin tries to infer the region from the environment.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#region DatabaseSecretsMount#region}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#region DatabaseSecretsMount#region}
---
@@ -7311,7 +7395,7 @@ public java.util.List getRootRotationStatements();
A list of database statements to be executed to rotate the root user's credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
---
@@ -7327,7 +7411,7 @@ The AWS access key id to use to talk to ElastiCache.
If omitted the credentials chain provider is used instead.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
---
@@ -7341,7 +7425,7 @@ public java.lang.Object getVerifyConnection();
Specifies if the connection is verified during initial configuration.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
---
@@ -7403,7 +7487,7 @@ public java.lang.String getName();
Name of the database connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
---
@@ -7417,7 +7501,7 @@ public java.util.List getAllowedRoles();
A list of roles that are allowed to use this connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
---
@@ -7431,7 +7515,7 @@ public java.lang.String getConnectionUrl();
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
---
@@ -7445,7 +7529,7 @@ public java.util.Map getData();
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
---
@@ -7459,7 +7543,7 @@ public java.lang.Object getDisableEscaping();
Disable special character escaping in username and password.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping}
---
@@ -7473,7 +7557,7 @@ public java.lang.Number getMaxConnectionLifetime();
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
---
@@ -7487,7 +7571,7 @@ public java.lang.Number getMaxIdleConnections();
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
---
@@ -7501,7 +7585,7 @@ public java.lang.Number getMaxOpenConnections();
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
---
@@ -7515,7 +7599,7 @@ public java.lang.String getPassword();
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
---
@@ -7531,7 +7615,7 @@ Specifies the name of the plugin to use for this connection.
Must be prefixed with the name of one of the supported database engine types.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
---
@@ -7545,7 +7629,7 @@ public java.util.List getRootRotationStatements();
A list of database statements to be executed to rotate the root user's credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
---
@@ -7559,7 +7643,7 @@ public java.lang.String getUsername();
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
---
@@ -7573,7 +7657,7 @@ public java.lang.String getUsernameTemplate();
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
---
@@ -7587,7 +7671,7 @@ public java.lang.Object getVerifyConnection();
Specifies if the connection is verified during initial configuration.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
---
@@ -7646,7 +7730,7 @@ public java.lang.String getName();
Name of the database connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
---
@@ -7660,7 +7744,7 @@ public java.util.List getAllowedRoles();
A list of roles that are allowed to use this connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
---
@@ -7674,7 +7758,7 @@ public java.lang.String getConnectionUrl();
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
---
@@ -7688,7 +7772,7 @@ public java.util.Map getData();
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
---
@@ -7702,7 +7786,7 @@ public java.lang.Number getMaxConnectionLifetime();
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
---
@@ -7716,7 +7800,7 @@ public java.lang.Number getMaxIdleConnections();
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
---
@@ -7730,7 +7814,7 @@ public java.lang.Number getMaxOpenConnections();
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
---
@@ -7744,7 +7828,7 @@ public java.lang.String getPassword();
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
---
@@ -7760,7 +7844,7 @@ Specifies the name of the plugin to use for this connection.
Must be prefixed with the name of one of the supported database engine types.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
---
@@ -7774,7 +7858,7 @@ public java.util.List getRootRotationStatements();
A list of database statements to be executed to rotate the root user's credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
---
@@ -7788,7 +7872,7 @@ public java.lang.String getUsername();
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
---
@@ -7802,7 +7886,7 @@ public java.lang.String getUsernameTemplate();
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
---
@@ -7816,7 +7900,7 @@ public java.lang.Object getVerifyConnection();
Specifies if the connection is verified during initial configuration.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
---
@@ -8062,6 +8146,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it
| resetPort
| *No description.* |
| resetProtocolVersion
| *No description.* |
| resetRootRotationStatements
| *No description.* |
+| resetSkipVerification
| *No description.* |
| resetTls
| *No description.* |
| resetUsername
| *No description.* |
| resetVerifyConnection
| *No description.* |
@@ -8290,6 +8375,12 @@ public void resetProtocolVersion()
public void resetRootRotationStatements()
```
+##### `resetSkipVerification`
+
+```java
+public void resetSkipVerification()
+```
+
##### `resetTls`
```java
@@ -8328,6 +8419,7 @@ public void resetVerifyConnection()
| portInput
| java.lang.Number
| *No description.* |
| protocolVersionInput
| java.lang.Number
| *No description.* |
| rootRotationStatementsInput
| java.util.List
| *No description.* |
+| skipVerificationInput
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| *No description.* |
| tlsInput
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| *No description.* |
| usernameInput
| java.lang.String
| *No description.* |
| verifyConnectionInput
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| *No description.* |
@@ -8344,6 +8436,7 @@ public void resetVerifyConnection()
| port
| java.lang.Number
| *No description.* |
| protocolVersion
| java.lang.Number
| *No description.* |
| rootRotationStatements
| java.util.List
| *No description.* |
+| skipVerification
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| *No description.* |
| tls
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| *No description.* |
| username
| java.lang.String
| *No description.* |
| verifyConnection
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| *No description.* |
@@ -8505,6 +8598,16 @@ public java.util.List getRootRotationStatementsInput();
---
+##### `skipVerificationInput`Optional
+
+```java
+public java.lang.Object getSkipVerificationInput();
+```
+
+- *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
+
+---
+
##### `tlsInput`Optional
```java
@@ -8665,6 +8768,16 @@ public java.util.List getRootRotationStatements();
---
+##### `skipVerification`Required
+
+```java
+public java.lang.Object getSkipVerification();
+```
+
+- *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
+
+---
+
##### `tls`Required
```java
@@ -19091,8 +19204,12 @@ whether the list is wrapping a set (will add tolist() to be able to access an it
| resetMaxOpenConnections
| *No description.* |
| resetPassword
| *No description.* |
| resetPluginName
| *No description.* |
+| resetPrivateKey
| *No description.* |
| resetRootRotationStatements
| *No description.* |
+| resetSelfManaged
| *No description.* |
| resetServiceAccountJson
| *No description.* |
+| resetTlsCa
| *No description.* |
+| resetTlsCertificate
| *No description.* |
| resetUsername
| *No description.* |
| resetUsernameTemplate
| *No description.* |
| resetVerifyConnection
| *No description.* |
@@ -19309,18 +19426,42 @@ public void resetPassword()
public void resetPluginName()
```
+##### `resetPrivateKey`
+
+```java
+public void resetPrivateKey()
+```
+
##### `resetRootRotationStatements`
```java
public void resetRootRotationStatements()
```
+##### `resetSelfManaged`
+
+```java
+public void resetSelfManaged()
+```
+
##### `resetServiceAccountJson`
```java
public void resetServiceAccountJson()
```
+##### `resetTlsCa`
+
+```java
+public void resetTlsCa()
+```
+
+##### `resetTlsCertificate`
+
+```java
+public void resetTlsCertificate()
+```
+
##### `resetUsername`
```java
@@ -19357,8 +19498,12 @@ public void resetVerifyConnection()
| nameInput
| java.lang.String
| *No description.* |
| passwordInput
| java.lang.String
| *No description.* |
| pluginNameInput
| java.lang.String
| *No description.* |
+| privateKeyInput
| java.lang.String
| *No description.* |
| rootRotationStatementsInput
| java.util.List
| *No description.* |
+| selfManagedInput
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| *No description.* |
| serviceAccountJsonInput
| java.lang.String
| *No description.* |
+| tlsCaInput
| java.lang.String
| *No description.* |
+| tlsCertificateInput
| java.lang.String
| *No description.* |
| usernameInput
| java.lang.String
| *No description.* |
| usernameTemplateInput
| java.lang.String
| *No description.* |
| verifyConnectionInput
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| *No description.* |
@@ -19373,8 +19518,12 @@ public void resetVerifyConnection()
| name
| java.lang.String
| *No description.* |
| password
| java.lang.String
| *No description.* |
| pluginName
| java.lang.String
| *No description.* |
+| privateKey
| java.lang.String
| *No description.* |
| rootRotationStatements
| java.util.List
| *No description.* |
+| selfManaged
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| *No description.* |
| serviceAccountJson
| java.lang.String
| *No description.* |
+| tlsCa
| java.lang.String
| *No description.* |
+| tlsCertificate
| java.lang.String
| *No description.* |
| username
| java.lang.String
| *No description.* |
| usernameTemplate
| java.lang.String
| *No description.* |
| verifyConnection
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| *No description.* |
@@ -19516,6 +19665,16 @@ public java.lang.String getPluginNameInput();
---
+##### `privateKeyInput`Optional
+
+```java
+public java.lang.String getPrivateKeyInput();
+```
+
+- *Type:* java.lang.String
+
+---
+
##### `rootRotationStatementsInput`Optional
```java
@@ -19526,6 +19685,16 @@ public java.util.List getRootRotationStatementsInput();
---
+##### `selfManagedInput`Optional
+
+```java
+public java.lang.Object getSelfManagedInput();
+```
+
+- *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
+
+---
+
##### `serviceAccountJsonInput`Optional
```java
@@ -19536,6 +19705,26 @@ public java.lang.String getServiceAccountJsonInput();
---
+##### `tlsCaInput`Optional
+
+```java
+public java.lang.String getTlsCaInput();
+```
+
+- *Type:* java.lang.String
+
+---
+
+##### `tlsCertificateInput`Optional
+
+```java
+public java.lang.String getTlsCertificateInput();
+```
+
+- *Type:* java.lang.String
+
+---
+
##### `usernameInput`Optional
```java
@@ -19676,6 +19865,16 @@ public java.lang.String getPluginName();
---
+##### `privateKey`Required
+
+```java
+public java.lang.String getPrivateKey();
+```
+
+- *Type:* java.lang.String
+
+---
+
##### `rootRotationStatements`Required
```java
@@ -19686,6 +19885,16 @@ public java.util.List getRootRotationStatements();
---
+##### `selfManaged`Required
+
+```java
+public java.lang.Object getSelfManaged();
+```
+
+- *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
+
+---
+
##### `serviceAccountJson`Required
```java
@@ -19696,6 +19905,26 @@ public java.lang.String getServiceAccountJson();
---
+##### `tlsCa`Required
+
+```java
+public java.lang.String getTlsCa();
+```
+
+- *Type:* java.lang.String
+
+---
+
+##### `tlsCertificate`Required
+
+```java
+public java.lang.String getTlsCertificate();
+```
+
+- *Type:* java.lang.String
+
+---
+
##### `username`Required
```java
diff --git a/docs/databaseSecretsMount.python.md b/docs/databaseSecretsMount.python.md
index 745b6c0c..d7ad784b 100644
--- a/docs/databaseSecretsMount.python.md
+++ b/docs/databaseSecretsMount.python.md
@@ -4,7 +4,7 @@
### DatabaseSecretsMount
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount vault_database_secrets_mount}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount vault_database_secrets_mount}.
#### Initializers
@@ -85,7 +85,7 @@ databaseSecretsMount.DatabaseSecretsMount(
| elasticsearch
| typing.Union[cdktf.IResolvable, typing.List[DatabaseSecretsMountElasticsearch]]
| elasticsearch block. |
| external_entropy_access
| typing.Union[bool, cdktf.IResolvable]
| Enable the secrets engine to access Vault's external entropy source. |
| hana
| typing.Union[cdktf.IResolvable, typing.List[DatabaseSecretsMountHana]]
| hana block. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#id DatabaseSecretsMount#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#id DatabaseSecretsMount#id}. |
| identity_token_key
| str
| The key to use for signing plugin workload identity tokens. |
| influxdb
| typing.Union[cdktf.IResolvable, typing.List[DatabaseSecretsMountInfluxdb]]
| influxdb block. |
| listing_visibility
| str
| Specifies whether to show this mount in the UI-specific listing endpoint. |
@@ -178,7 +178,7 @@ Must be unique amongst siblings in the same scope
Where the secret backend will be mounted.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#path DatabaseSecretsMount#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#path DatabaseSecretsMount#path}
---
@@ -188,7 +188,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
List of managed key registry entry names that the mount in question is allowed to access.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_managed_keys DatabaseSecretsMount#allowed_managed_keys}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_managed_keys DatabaseSecretsMount#allowed_managed_keys}
---
@@ -198,7 +198,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
List of headers to allow and pass from the request to the plugin.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_response_headers DatabaseSecretsMount#allowed_response_headers}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_response_headers DatabaseSecretsMount#allowed_response_headers}
---
@@ -208,7 +208,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#audit_non_hmac_request_keys DatabaseSecretsMount#audit_non_hmac_request_keys}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#audit_non_hmac_request_keys DatabaseSecretsMount#audit_non_hmac_request_keys}
---
@@ -218,7 +218,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#audit_non_hmac_response_keys DatabaseSecretsMount#audit_non_hmac_response_keys}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#audit_non_hmac_response_keys DatabaseSecretsMount#audit_non_hmac_response_keys}
---
@@ -228,7 +228,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
cassandra block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#cassandra DatabaseSecretsMount#cassandra}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#cassandra DatabaseSecretsMount#cassandra}
---
@@ -238,7 +238,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
couchbase block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#couchbase DatabaseSecretsMount#couchbase}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#couchbase DatabaseSecretsMount#couchbase}
---
@@ -248,7 +248,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Default lease duration for tokens and secrets in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#default_lease_ttl_seconds DatabaseSecretsMount#default_lease_ttl_seconds}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#default_lease_ttl_seconds DatabaseSecretsMount#default_lease_ttl_seconds}
---
@@ -258,7 +258,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
List of headers to allow and pass from the request to the plugin.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#delegated_auth_accessors DatabaseSecretsMount#delegated_auth_accessors}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#delegated_auth_accessors DatabaseSecretsMount#delegated_auth_accessors}
---
@@ -268,7 +268,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Human-friendly description of the mount.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#description DatabaseSecretsMount#description}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#description DatabaseSecretsMount#description}
---
@@ -278,7 +278,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
elasticsearch block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#elasticsearch DatabaseSecretsMount#elasticsearch}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#elasticsearch DatabaseSecretsMount#elasticsearch}
---
@@ -288,7 +288,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Enable the secrets engine to access Vault's external entropy source.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#external_entropy_access DatabaseSecretsMount#external_entropy_access}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#external_entropy_access DatabaseSecretsMount#external_entropy_access}
---
@@ -298,7 +298,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
hana block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#hana DatabaseSecretsMount#hana}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#hana DatabaseSecretsMount#hana}
---
@@ -306,7 +306,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#id DatabaseSecretsMount#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#id DatabaseSecretsMount#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -319,7 +319,7 @@ If you experience problems setting this value it might not be settable. Please t
The key to use for signing plugin workload identity tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#identity_token_key DatabaseSecretsMount#identity_token_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#identity_token_key DatabaseSecretsMount#identity_token_key}
---
@@ -329,7 +329,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
influxdb block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#influxdb DatabaseSecretsMount#influxdb}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#influxdb DatabaseSecretsMount#influxdb}
---
@@ -339,7 +339,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Specifies whether to show this mount in the UI-specific listing endpoint.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#listing_visibility DatabaseSecretsMount#listing_visibility}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#listing_visibility DatabaseSecretsMount#listing_visibility}
---
@@ -349,7 +349,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Local mount flag that can be explicitly set to true to enforce local mount in HA environment.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#local DatabaseSecretsMount#local}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#local DatabaseSecretsMount#local}
---
@@ -359,7 +359,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Maximum possible lease duration for tokens and secrets in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_lease_ttl_seconds DatabaseSecretsMount#max_lease_ttl_seconds}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_lease_ttl_seconds DatabaseSecretsMount#max_lease_ttl_seconds}
---
@@ -369,7 +369,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
mongodb block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#mongodb DatabaseSecretsMount#mongodb}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#mongodb DatabaseSecretsMount#mongodb}
---
@@ -379,7 +379,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
mongodbatlas block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#mongodbatlas DatabaseSecretsMount#mongodbatlas}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#mongodbatlas DatabaseSecretsMount#mongodbatlas}
---
@@ -389,7 +389,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
mssql block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#mssql DatabaseSecretsMount#mssql}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#mssql DatabaseSecretsMount#mssql}
---
@@ -399,7 +399,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
mysql block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#mysql DatabaseSecretsMount#mysql}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#mysql DatabaseSecretsMount#mysql}
---
@@ -409,7 +409,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
mysql_aurora block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#mysql_aurora DatabaseSecretsMount#mysql_aurora}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#mysql_aurora DatabaseSecretsMount#mysql_aurora}
---
@@ -419,7 +419,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
mysql_legacy block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#mysql_legacy DatabaseSecretsMount#mysql_legacy}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#mysql_legacy DatabaseSecretsMount#mysql_legacy}
---
@@ -429,7 +429,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
mysql_rds block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#mysql_rds DatabaseSecretsMount#mysql_rds}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#mysql_rds DatabaseSecretsMount#mysql_rds}
---
@@ -439,7 +439,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#namespace DatabaseSecretsMount#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#namespace DatabaseSecretsMount#namespace}
---
@@ -449,7 +449,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Specifies mount type specific options that are passed to the backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#options DatabaseSecretsMount#options}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#options DatabaseSecretsMount#options}
---
@@ -459,7 +459,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
oracle block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#oracle DatabaseSecretsMount#oracle}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#oracle DatabaseSecretsMount#oracle}
---
@@ -469,7 +469,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
List of headers to allow and pass from the request to the plugin.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#passthrough_request_headers DatabaseSecretsMount#passthrough_request_headers}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#passthrough_request_headers DatabaseSecretsMount#passthrough_request_headers}
---
@@ -479,7 +479,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_version DatabaseSecretsMount#plugin_version}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_version DatabaseSecretsMount#plugin_version}
---
@@ -489,7 +489,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
postgresql block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#postgresql DatabaseSecretsMount#postgresql}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#postgresql DatabaseSecretsMount#postgresql}
---
@@ -499,7 +499,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
redis block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#redis DatabaseSecretsMount#redis}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#redis DatabaseSecretsMount#redis}
---
@@ -509,7 +509,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
redis_elasticache block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#redis_elasticache DatabaseSecretsMount#redis_elasticache}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#redis_elasticache DatabaseSecretsMount#redis_elasticache}
---
@@ -519,7 +519,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
redshift block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#redshift DatabaseSecretsMount#redshift}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#redshift DatabaseSecretsMount#redshift}
---
@@ -529,7 +529,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#seal_wrap DatabaseSecretsMount#seal_wrap}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#seal_wrap DatabaseSecretsMount#seal_wrap}
---
@@ -539,7 +539,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
snowflake block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#snowflake DatabaseSecretsMount#snowflake}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#snowflake DatabaseSecretsMount#snowflake}
---
@@ -1534,7 +1534,7 @@ The construct id used in the generated config for the DatabaseSecretsMount to im
The id of the existing DatabaseSecretsMount that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#import import section} in the documentation of this resource for the id to use
---
@@ -2586,6 +2586,7 @@ databaseSecretsMount.DatabaseSecretsMountCassandra(
port: typing.Union[int, float] = None,
protocol_version: typing.Union[int, float] = None,
root_rotation_statements: typing.List[str] = None,
+ skip_verification: typing.Union[bool, IResolvable] = None,
tls: typing.Union[bool, IResolvable] = None,
username: str = None,
verify_connection: typing.Union[bool, IResolvable] = None
@@ -2609,6 +2610,7 @@ databaseSecretsMount.DatabaseSecretsMountCassandra(
| port
| typing.Union[int, float]
| The transport port to use to connect to Cassandra. |
| protocol_version
| typing.Union[int, float]
| The CQL protocol version to use. |
| root_rotation_statements
| typing.List[str]
| A list of database statements to be executed to rotate the root user's credentials. |
+| skip_verification
| typing.Union[bool, cdktf.IResolvable]
| Skip permissions checks when a connection to Cassandra is first created. |
| tls
| typing.Union[bool, cdktf.IResolvable]
| Whether to use TLS when connecting to Cassandra. |
| username
| str
| The username to use when authenticating with Cassandra. |
| verify_connection
| typing.Union[bool, cdktf.IResolvable]
| Specifies if the connection is verified during initial configuration. |
@@ -2625,7 +2627,7 @@ name: str
Name of the database connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
---
@@ -2639,7 +2641,7 @@ allowed_roles: typing.List[str]
A list of roles that are allowed to use this connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
---
@@ -2653,7 +2655,7 @@ connect_timeout: typing.Union[int, float]
The number of seconds to use as a connection timeout.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connect_timeout DatabaseSecretsMount#connect_timeout}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connect_timeout DatabaseSecretsMount#connect_timeout}
---
@@ -2667,7 +2669,7 @@ data: typing.Mapping[str]
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
---
@@ -2681,7 +2683,7 @@ hosts: typing.List[str]
Cassandra hosts to connect to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#hosts DatabaseSecretsMount#hosts}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#hosts DatabaseSecretsMount#hosts}
---
@@ -2695,7 +2697,7 @@ insecure_tls: typing.Union[bool, IResolvable]
Whether to skip verification of the server certificate when using TLS.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls}
---
@@ -2709,7 +2711,7 @@ password: str
The password to use when authenticating with Cassandra.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
---
@@ -2725,7 +2727,7 @@ Concatenated PEM blocks containing a certificate and private key;
a certificate, private key, and issuing CA certificate; or just a CA certificate.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#pem_bundle DatabaseSecretsMount#pem_bundle}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#pem_bundle DatabaseSecretsMount#pem_bundle}
---
@@ -2741,7 +2743,7 @@ Specifies JSON containing a certificate and private key;
a certificate, private key, and issuing CA certificate; or just a CA certificate.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#pem_json DatabaseSecretsMount#pem_json}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#pem_json DatabaseSecretsMount#pem_json}
---
@@ -2757,7 +2759,7 @@ Specifies the name of the plugin to use for this connection.
Must be prefixed with the name of one of the supported database engine types.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
---
@@ -2771,7 +2773,7 @@ port: typing.Union[int, float]
The transport port to use to connect to Cassandra.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#port DatabaseSecretsMount#port}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#port DatabaseSecretsMount#port}
---
@@ -2785,7 +2787,7 @@ protocol_version: typing.Union[int, float]
The CQL protocol version to use.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#protocol_version DatabaseSecretsMount#protocol_version}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#protocol_version DatabaseSecretsMount#protocol_version}
---
@@ -2799,7 +2801,23 @@ root_rotation_statements: typing.List[str]
A list of database statements to be executed to rotate the root user's credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
+
+---
+
+##### `skip_verification`Optional
+
+```python
+skip_verification: typing.Union[bool, IResolvable]
+```
+
+- *Type:* typing.Union[bool, cdktf.IResolvable]
+
+Skip permissions checks when a connection to Cassandra is first created.
+
+These checks ensure that Vault is able to create roles, but can be resource intensive in clusters with many roles.
+
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#skip_verification DatabaseSecretsMount#skip_verification}
---
@@ -2813,7 +2831,7 @@ tls: typing.Union[bool, IResolvable]
Whether to use TLS when connecting to Cassandra.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls}
---
@@ -2827,7 +2845,7 @@ username: str
The username to use when authenticating with Cassandra.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
---
@@ -2841,7 +2859,7 @@ verify_connection: typing.Union[bool, IResolvable]
Specifies if the connection is verified during initial configuration.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
---
@@ -2924,7 +2942,7 @@ databaseSecretsMount.DatabaseSecretsMountConfig(
| elasticsearch
| typing.Union[cdktf.IResolvable, typing.List[DatabaseSecretsMountElasticsearch]]
| elasticsearch block. |
| external_entropy_access
| typing.Union[bool, cdktf.IResolvable]
| Enable the secrets engine to access Vault's external entropy source. |
| hana
| typing.Union[cdktf.IResolvable, typing.List[DatabaseSecretsMountHana]]
| hana block. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#id DatabaseSecretsMount#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#id DatabaseSecretsMount#id}. |
| identity_token_key
| str
| The key to use for signing plugin workload identity tokens. |
| influxdb
| typing.Union[cdktf.IResolvable, typing.List[DatabaseSecretsMountInfluxdb]]
| influxdb block. |
| listing_visibility
| str
| Specifies whether to show this mount in the UI-specific listing endpoint. |
@@ -3031,7 +3049,7 @@ path: str
Where the secret backend will be mounted.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#path DatabaseSecretsMount#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#path DatabaseSecretsMount#path}
---
@@ -3045,7 +3063,7 @@ allowed_managed_keys: typing.List[str]
List of managed key registry entry names that the mount in question is allowed to access.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_managed_keys DatabaseSecretsMount#allowed_managed_keys}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_managed_keys DatabaseSecretsMount#allowed_managed_keys}
---
@@ -3059,7 +3077,7 @@ allowed_response_headers: typing.List[str]
List of headers to allow and pass from the request to the plugin.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_response_headers DatabaseSecretsMount#allowed_response_headers}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_response_headers DatabaseSecretsMount#allowed_response_headers}
---
@@ -3073,7 +3091,7 @@ audit_non_hmac_request_keys: typing.List[str]
Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#audit_non_hmac_request_keys DatabaseSecretsMount#audit_non_hmac_request_keys}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#audit_non_hmac_request_keys DatabaseSecretsMount#audit_non_hmac_request_keys}
---
@@ -3087,7 +3105,7 @@ audit_non_hmac_response_keys: typing.List[str]
Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#audit_non_hmac_response_keys DatabaseSecretsMount#audit_non_hmac_response_keys}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#audit_non_hmac_response_keys DatabaseSecretsMount#audit_non_hmac_response_keys}
---
@@ -3101,7 +3119,7 @@ cassandra: typing.Union[IResolvable, typing.List[DatabaseSecretsMountCassandra]]
cassandra block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#cassandra DatabaseSecretsMount#cassandra}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#cassandra DatabaseSecretsMount#cassandra}
---
@@ -3115,7 +3133,7 @@ couchbase: typing.Union[IResolvable, typing.List[DatabaseSecretsMountCouchbase]]
couchbase block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#couchbase DatabaseSecretsMount#couchbase}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#couchbase DatabaseSecretsMount#couchbase}
---
@@ -3129,7 +3147,7 @@ default_lease_ttl_seconds: typing.Union[int, float]
Default lease duration for tokens and secrets in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#default_lease_ttl_seconds DatabaseSecretsMount#default_lease_ttl_seconds}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#default_lease_ttl_seconds DatabaseSecretsMount#default_lease_ttl_seconds}
---
@@ -3143,7 +3161,7 @@ delegated_auth_accessors: typing.List[str]
List of headers to allow and pass from the request to the plugin.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#delegated_auth_accessors DatabaseSecretsMount#delegated_auth_accessors}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#delegated_auth_accessors DatabaseSecretsMount#delegated_auth_accessors}
---
@@ -3157,7 +3175,7 @@ description: str
Human-friendly description of the mount.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#description DatabaseSecretsMount#description}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#description DatabaseSecretsMount#description}
---
@@ -3171,7 +3189,7 @@ elasticsearch: typing.Union[IResolvable, typing.List[DatabaseSecretsMountElastic
elasticsearch block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#elasticsearch DatabaseSecretsMount#elasticsearch}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#elasticsearch DatabaseSecretsMount#elasticsearch}
---
@@ -3185,7 +3203,7 @@ external_entropy_access: typing.Union[bool, IResolvable]
Enable the secrets engine to access Vault's external entropy source.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#external_entropy_access DatabaseSecretsMount#external_entropy_access}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#external_entropy_access DatabaseSecretsMount#external_entropy_access}
---
@@ -3199,7 +3217,7 @@ hana: typing.Union[IResolvable, typing.List[DatabaseSecretsMountHana]]
hana block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#hana DatabaseSecretsMount#hana}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#hana DatabaseSecretsMount#hana}
---
@@ -3211,7 +3229,7 @@ id: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#id DatabaseSecretsMount#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#id DatabaseSecretsMount#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -3228,7 +3246,7 @@ identity_token_key: str
The key to use for signing plugin workload identity tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#identity_token_key DatabaseSecretsMount#identity_token_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#identity_token_key DatabaseSecretsMount#identity_token_key}
---
@@ -3242,7 +3260,7 @@ influxdb: typing.Union[IResolvable, typing.List[DatabaseSecretsMountInfluxdb]]
influxdb block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#influxdb DatabaseSecretsMount#influxdb}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#influxdb DatabaseSecretsMount#influxdb}
---
@@ -3256,7 +3274,7 @@ listing_visibility: str
Specifies whether to show this mount in the UI-specific listing endpoint.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#listing_visibility DatabaseSecretsMount#listing_visibility}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#listing_visibility DatabaseSecretsMount#listing_visibility}
---
@@ -3270,7 +3288,7 @@ local: typing.Union[bool, IResolvable]
Local mount flag that can be explicitly set to true to enforce local mount in HA environment.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#local DatabaseSecretsMount#local}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#local DatabaseSecretsMount#local}
---
@@ -3284,7 +3302,7 @@ max_lease_ttl_seconds: typing.Union[int, float]
Maximum possible lease duration for tokens and secrets in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_lease_ttl_seconds DatabaseSecretsMount#max_lease_ttl_seconds}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_lease_ttl_seconds DatabaseSecretsMount#max_lease_ttl_seconds}
---
@@ -3298,7 +3316,7 @@ mongodb: typing.Union[IResolvable, typing.List[DatabaseSecretsMountMongodb]]
mongodb block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#mongodb DatabaseSecretsMount#mongodb}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#mongodb DatabaseSecretsMount#mongodb}
---
@@ -3312,7 +3330,7 @@ mongodbatlas: typing.Union[IResolvable, typing.List[DatabaseSecretsMountMongodba
mongodbatlas block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#mongodbatlas DatabaseSecretsMount#mongodbatlas}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#mongodbatlas DatabaseSecretsMount#mongodbatlas}
---
@@ -3326,7 +3344,7 @@ mssql: typing.Union[IResolvable, typing.List[DatabaseSecretsMountMssql]]
mssql block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#mssql DatabaseSecretsMount#mssql}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#mssql DatabaseSecretsMount#mssql}
---
@@ -3340,7 +3358,7 @@ mysql: typing.Union[IResolvable, typing.List[DatabaseSecretsMountMysql]]
mysql block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#mysql DatabaseSecretsMount#mysql}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#mysql DatabaseSecretsMount#mysql}
---
@@ -3354,7 +3372,7 @@ mysql_aurora: typing.Union[IResolvable, typing.List[DatabaseSecretsMountMysqlAur
mysql_aurora block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#mysql_aurora DatabaseSecretsMount#mysql_aurora}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#mysql_aurora DatabaseSecretsMount#mysql_aurora}
---
@@ -3368,7 +3386,7 @@ mysql_legacy: typing.Union[IResolvable, typing.List[DatabaseSecretsMountMysqlLeg
mysql_legacy block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#mysql_legacy DatabaseSecretsMount#mysql_legacy}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#mysql_legacy DatabaseSecretsMount#mysql_legacy}
---
@@ -3382,7 +3400,7 @@ mysql_rds: typing.Union[IResolvable, typing.List[DatabaseSecretsMountMysqlRds]]
mysql_rds block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#mysql_rds DatabaseSecretsMount#mysql_rds}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#mysql_rds DatabaseSecretsMount#mysql_rds}
---
@@ -3396,7 +3414,7 @@ namespace: str
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#namespace DatabaseSecretsMount#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#namespace DatabaseSecretsMount#namespace}
---
@@ -3410,7 +3428,7 @@ options: typing.Mapping[str]
Specifies mount type specific options that are passed to the backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#options DatabaseSecretsMount#options}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#options DatabaseSecretsMount#options}
---
@@ -3424,7 +3442,7 @@ oracle: typing.Union[IResolvable, typing.List[DatabaseSecretsMountOracle]]
oracle block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#oracle DatabaseSecretsMount#oracle}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#oracle DatabaseSecretsMount#oracle}
---
@@ -3438,7 +3456,7 @@ passthrough_request_headers: typing.List[str]
List of headers to allow and pass from the request to the plugin.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#passthrough_request_headers DatabaseSecretsMount#passthrough_request_headers}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#passthrough_request_headers DatabaseSecretsMount#passthrough_request_headers}
---
@@ -3452,7 +3470,7 @@ plugin_version: str
Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_version DatabaseSecretsMount#plugin_version}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_version DatabaseSecretsMount#plugin_version}
---
@@ -3466,7 +3484,7 @@ postgresql: typing.Union[IResolvable, typing.List[DatabaseSecretsMountPostgresql
postgresql block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#postgresql DatabaseSecretsMount#postgresql}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#postgresql DatabaseSecretsMount#postgresql}
---
@@ -3480,7 +3498,7 @@ redis: typing.Union[IResolvable, typing.List[DatabaseSecretsMountRedis]]
redis block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#redis DatabaseSecretsMount#redis}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#redis DatabaseSecretsMount#redis}
---
@@ -3494,7 +3512,7 @@ redis_elasticache: typing.Union[IResolvable, typing.List[DatabaseSecretsMountRed
redis_elasticache block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#redis_elasticache DatabaseSecretsMount#redis_elasticache}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#redis_elasticache DatabaseSecretsMount#redis_elasticache}
---
@@ -3508,7 +3526,7 @@ redshift: typing.Union[IResolvable, typing.List[DatabaseSecretsMountRedshift]]
redshift block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#redshift DatabaseSecretsMount#redshift}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#redshift DatabaseSecretsMount#redshift}
---
@@ -3522,7 +3540,7 @@ seal_wrap: typing.Union[bool, IResolvable]
Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#seal_wrap DatabaseSecretsMount#seal_wrap}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#seal_wrap DatabaseSecretsMount#seal_wrap}
---
@@ -3536,7 +3554,7 @@ snowflake: typing.Union[IResolvable, typing.List[DatabaseSecretsMountSnowflake]]
snowflake block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#snowflake DatabaseSecretsMount#snowflake}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#snowflake DatabaseSecretsMount#snowflake}
---
@@ -3596,7 +3614,7 @@ hosts: typing.List[str]
A set of Couchbase URIs to connect to. Must use `couchbases://` scheme if `tls` is `true`.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#hosts DatabaseSecretsMount#hosts}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#hosts DatabaseSecretsMount#hosts}
---
@@ -3610,7 +3628,7 @@ name: str
Name of the database connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
---
@@ -3624,7 +3642,7 @@ password: str
Specifies the password corresponding to the given username.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
---
@@ -3638,7 +3656,7 @@ username: str
Specifies the username for Vault to use.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
---
@@ -3652,7 +3670,7 @@ allowed_roles: typing.List[str]
A list of roles that are allowed to use this connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
---
@@ -3668,7 +3686,7 @@ Required if `tls` is `true`.
Specifies the certificate authority of the Couchbase server, as a PEM certificate that has been base64 encoded.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#base64_pem DatabaseSecretsMount#base64_pem}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#base64_pem DatabaseSecretsMount#base64_pem}
---
@@ -3682,7 +3700,7 @@ bucket_name: str
Required for Couchbase versions prior to 6.5.0. This is only used to verify vault's connection to the server.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#bucket_name DatabaseSecretsMount#bucket_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#bucket_name DatabaseSecretsMount#bucket_name}
---
@@ -3696,7 +3714,7 @@ data: typing.Mapping[str]
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
---
@@ -3710,7 +3728,7 @@ insecure_tls: typing.Union[bool, IResolvable]
Specifies whether to skip verification of the server certificate when using TLS.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls}
---
@@ -3726,7 +3744,7 @@ Specifies the name of the plugin to use for this connection.
Must be prefixed with the name of one of the supported database engine types.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
---
@@ -3740,7 +3758,7 @@ root_rotation_statements: typing.List[str]
A list of database statements to be executed to rotate the root user's credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
---
@@ -3754,7 +3772,7 @@ tls: typing.Union[bool, IResolvable]
Specifies whether to use TLS when connecting to Couchbase.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls}
---
@@ -3768,7 +3786,7 @@ username_template: str
Template describing how dynamic usernames are generated.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
---
@@ -3782,7 +3800,7 @@ verify_connection: typing.Union[bool, IResolvable]
Specifies if the connection is verified during initial configuration.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
---
@@ -3846,7 +3864,7 @@ name: str
Name of the database connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
---
@@ -3860,7 +3878,7 @@ password: str
The password to be used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
---
@@ -3874,7 +3892,7 @@ url: str
The URL for Elasticsearch's API.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#url DatabaseSecretsMount#url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#url DatabaseSecretsMount#url}
---
@@ -3888,7 +3906,7 @@ username: str
The username to be used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
---
@@ -3902,7 +3920,7 @@ allowed_roles: typing.List[str]
A list of roles that are allowed to use this connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
---
@@ -3916,7 +3934,7 @@ ca_cert: str
The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#ca_cert DatabaseSecretsMount#ca_cert}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#ca_cert DatabaseSecretsMount#ca_cert}
---
@@ -3930,7 +3948,7 @@ ca_path: str
The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#ca_path DatabaseSecretsMount#ca_path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#ca_path DatabaseSecretsMount#ca_path}
---
@@ -3944,7 +3962,7 @@ client_cert: str
The path to the certificate for the Elasticsearch client to present for communication.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#client_cert DatabaseSecretsMount#client_cert}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#client_cert DatabaseSecretsMount#client_cert}
---
@@ -3958,7 +3976,7 @@ client_key: str
The path to the key for the Elasticsearch client to use for communication.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#client_key DatabaseSecretsMount#client_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#client_key DatabaseSecretsMount#client_key}
---
@@ -3972,7 +3990,7 @@ data: typing.Mapping[str]
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
---
@@ -3986,7 +4004,7 @@ insecure: typing.Union[bool, IResolvable]
Whether to disable certificate verification.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#insecure DatabaseSecretsMount#insecure}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#insecure DatabaseSecretsMount#insecure}
---
@@ -4002,7 +4020,7 @@ Specifies the name of the plugin to use for this connection.
Must be prefixed with the name of one of the supported database engine types.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
---
@@ -4016,7 +4034,7 @@ root_rotation_statements: typing.List[str]
A list of database statements to be executed to rotate the root user's credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
---
@@ -4030,7 +4048,7 @@ tls_server_name: str
This, if set, is used to set the SNI host when connecting via TLS.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls_server_name DatabaseSecretsMount#tls_server_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_server_name DatabaseSecretsMount#tls_server_name}
---
@@ -4044,7 +4062,7 @@ username_template: str
Template describing how dynamic usernames are generated.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
---
@@ -4058,7 +4076,7 @@ verify_connection: typing.Union[bool, IResolvable]
Specifies if the connection is verified during initial configuration.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
---
@@ -4116,7 +4134,7 @@ name: str
Name of the database connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
---
@@ -4130,7 +4148,7 @@ allowed_roles: typing.List[str]
A list of roles that are allowed to use this connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
---
@@ -4144,7 +4162,7 @@ connection_url: str
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
---
@@ -4158,7 +4176,7 @@ data: typing.Mapping[str]
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
---
@@ -4172,7 +4190,7 @@ disable_escaping: typing.Union[bool, IResolvable]
Disable special character escaping in username and password.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping}
---
@@ -4186,7 +4204,7 @@ max_connection_lifetime: typing.Union[int, float]
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
---
@@ -4200,7 +4218,7 @@ max_idle_connections: typing.Union[int, float]
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
---
@@ -4214,7 +4232,7 @@ max_open_connections: typing.Union[int, float]
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
---
@@ -4228,7 +4246,7 @@ password: str
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
---
@@ -4244,7 +4262,7 @@ Specifies the name of the plugin to use for this connection.
Must be prefixed with the name of one of the supported database engine types.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
---
@@ -4258,7 +4276,7 @@ root_rotation_statements: typing.List[str]
A list of database statements to be executed to rotate the root user's credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
---
@@ -4272,7 +4290,7 @@ username: str
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
---
@@ -4286,7 +4304,7 @@ verify_connection: typing.Union[bool, IResolvable]
Specifies if the connection is verified during initial configuration.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
---
@@ -4350,7 +4368,7 @@ host: str
Influxdb host to connect to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#host DatabaseSecretsMount#host}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#host DatabaseSecretsMount#host}
---
@@ -4364,7 +4382,7 @@ name: str
Name of the database connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
---
@@ -4378,7 +4396,7 @@ password: str
Specifies the password corresponding to the given username.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
---
@@ -4392,7 +4410,7 @@ username: str
Specifies the username to use for superuser access.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
---
@@ -4406,7 +4424,7 @@ allowed_roles: typing.List[str]
A list of roles that are allowed to use this connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
---
@@ -4420,7 +4438,7 @@ connect_timeout: typing.Union[int, float]
The number of seconds to use as a connection timeout.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connect_timeout DatabaseSecretsMount#connect_timeout}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connect_timeout DatabaseSecretsMount#connect_timeout}
---
@@ -4434,7 +4452,7 @@ data: typing.Mapping[str]
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
---
@@ -4448,7 +4466,7 @@ insecure_tls: typing.Union[bool, IResolvable]
Whether to skip verification of the server certificate when using TLS.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls}
---
@@ -4464,7 +4482,7 @@ Concatenated PEM blocks containing a certificate and private key;
a certificate, private key, and issuing CA certificate; or just a CA certificate.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#pem_bundle DatabaseSecretsMount#pem_bundle}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#pem_bundle DatabaseSecretsMount#pem_bundle}
---
@@ -4480,7 +4498,7 @@ Specifies JSON containing a certificate and private key;
a certificate, private key, and issuing CA certificate; or just a CA certificate.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#pem_json DatabaseSecretsMount#pem_json}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#pem_json DatabaseSecretsMount#pem_json}
---
@@ -4496,7 +4514,7 @@ Specifies the name of the plugin to use for this connection.
Must be prefixed with the name of one of the supported database engine types.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
---
@@ -4510,7 +4528,7 @@ port: typing.Union[int, float]
The transport port to use to connect to Influxdb.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#port DatabaseSecretsMount#port}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#port DatabaseSecretsMount#port}
---
@@ -4524,7 +4542,7 @@ root_rotation_statements: typing.List[str]
A list of database statements to be executed to rotate the root user's credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
---
@@ -4538,7 +4556,7 @@ tls: typing.Union[bool, IResolvable]
Whether to use TLS when connecting to Influxdb.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls}
---
@@ -4552,7 +4570,7 @@ username_template: str
Template describing how dynamic usernames are generated.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
---
@@ -4566,7 +4584,7 @@ verify_connection: typing.Union[bool, IResolvable]
Specifies if the connection is verified during initial configuration.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
---
@@ -4624,7 +4642,7 @@ name: str
Name of the database connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
---
@@ -4638,7 +4656,7 @@ allowed_roles: typing.List[str]
A list of roles that are allowed to use this connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
---
@@ -4652,7 +4670,7 @@ connection_url: str
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
---
@@ -4666,7 +4684,7 @@ data: typing.Mapping[str]
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
---
@@ -4680,7 +4698,7 @@ max_connection_lifetime: typing.Union[int, float]
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
---
@@ -4694,7 +4712,7 @@ max_idle_connections: typing.Union[int, float]
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
---
@@ -4708,7 +4726,7 @@ max_open_connections: typing.Union[int, float]
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
---
@@ -4722,7 +4740,7 @@ password: str
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
---
@@ -4738,7 +4756,7 @@ Specifies the name of the plugin to use for this connection.
Must be prefixed with the name of one of the supported database engine types.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
---
@@ -4752,7 +4770,7 @@ root_rotation_statements: typing.List[str]
A list of database statements to be executed to rotate the root user's credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
---
@@ -4766,7 +4784,7 @@ username: str
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
---
@@ -4780,7 +4798,7 @@ username_template: str
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
---
@@ -4794,7 +4812,7 @@ verify_connection: typing.Union[bool, IResolvable]
Specifies if the connection is verified during initial configuration.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
---
@@ -4844,7 +4862,7 @@ name: str
Name of the database connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
---
@@ -4858,7 +4876,7 @@ private_key: str
The Private Programmatic API Key used to connect with MongoDB Atlas API.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#private_key DatabaseSecretsMount#private_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#private_key DatabaseSecretsMount#private_key}
---
@@ -4872,7 +4890,7 @@ project_id: str
The Project ID the Database User should be created within.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#project_id DatabaseSecretsMount#project_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#project_id DatabaseSecretsMount#project_id}
---
@@ -4886,7 +4904,7 @@ public_key: str
The Public Programmatic API Key used to authenticate with the MongoDB Atlas API.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#public_key DatabaseSecretsMount#public_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#public_key DatabaseSecretsMount#public_key}
---
@@ -4900,7 +4918,7 @@ allowed_roles: typing.List[str]
A list of roles that are allowed to use this connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
---
@@ -4914,7 +4932,7 @@ data: typing.Mapping[str]
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
---
@@ -4930,7 +4948,7 @@ Specifies the name of the plugin to use for this connection.
Must be prefixed with the name of one of the supported database engine types.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
---
@@ -4944,7 +4962,7 @@ root_rotation_statements: typing.List[str]
A list of database statements to be executed to rotate the root user's credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
---
@@ -4958,7 +4976,7 @@ verify_connection: typing.Union[bool, IResolvable]
Specifies if the connection is verified during initial configuration.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
---
@@ -5020,7 +5038,7 @@ name: str
Name of the database connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
---
@@ -5034,7 +5052,7 @@ allowed_roles: typing.List[str]
A list of roles that are allowed to use this connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
---
@@ -5048,7 +5066,7 @@ connection_url: str
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
---
@@ -5062,7 +5080,7 @@ contained_db: typing.Union[bool, IResolvable]
Set to true when the target is a Contained Database, e.g. AzureSQL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#contained_db DatabaseSecretsMount#contained_db}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#contained_db DatabaseSecretsMount#contained_db}
---
@@ -5076,7 +5094,7 @@ data: typing.Mapping[str]
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
---
@@ -5090,7 +5108,7 @@ disable_escaping: typing.Union[bool, IResolvable]
Disable special character escaping in username and password.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping}
---
@@ -5104,7 +5122,7 @@ max_connection_lifetime: typing.Union[int, float]
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
---
@@ -5118,7 +5136,7 @@ max_idle_connections: typing.Union[int, float]
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
---
@@ -5132,7 +5150,7 @@ max_open_connections: typing.Union[int, float]
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
---
@@ -5146,7 +5164,7 @@ password: str
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
---
@@ -5162,7 +5180,7 @@ Specifies the name of the plugin to use for this connection.
Must be prefixed with the name of one of the supported database engine types.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
---
@@ -5176,7 +5194,7 @@ root_rotation_statements: typing.List[str]
A list of database statements to be executed to rotate the root user's credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
---
@@ -5190,7 +5208,7 @@ username: str
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
---
@@ -5204,7 +5222,7 @@ username_template: str
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
---
@@ -5218,7 +5236,7 @@ verify_connection: typing.Union[bool, IResolvable]
Specifies if the connection is verified during initial configuration.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
---
@@ -5284,7 +5302,7 @@ name: str
Name of the database connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
---
@@ -5298,7 +5316,7 @@ allowed_roles: typing.List[str]
A list of roles that are allowed to use this connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
---
@@ -5312,7 +5330,7 @@ auth_type: str
Specify alternative authorization type. (Only 'gcp_iam' is valid currently).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type}
---
@@ -5326,7 +5344,7 @@ connection_url: str
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
---
@@ -5340,7 +5358,7 @@ data: typing.Mapping[str]
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
---
@@ -5354,7 +5372,7 @@ max_connection_lifetime: typing.Union[int, float]
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
---
@@ -5368,7 +5386,7 @@ max_idle_connections: typing.Union[int, float]
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
---
@@ -5382,7 +5400,7 @@ max_open_connections: typing.Union[int, float]
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
---
@@ -5396,7 +5414,7 @@ password: str
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
---
@@ -5412,7 +5430,7 @@ Specifies the name of the plugin to use for this connection.
Must be prefixed with the name of one of the supported database engine types.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
---
@@ -5426,7 +5444,7 @@ root_rotation_statements: typing.List[str]
A list of database statements to be executed to rotate the root user's credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
---
@@ -5440,7 +5458,7 @@ service_account_json: str
A JSON encoded credential for use with IAM authorization.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json}
---
@@ -5454,7 +5472,7 @@ tls_ca: str
x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca}
---
@@ -5470,7 +5488,7 @@ x509 certificate for connecting to the database.
This must be a PEM encoded version of the private key and the certificate combined.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key}
---
@@ -5484,7 +5502,7 @@ username: str
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
---
@@ -5498,7 +5516,7 @@ username_template: str
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
---
@@ -5512,7 +5530,7 @@ verify_connection: typing.Union[bool, IResolvable]
Specifies if the connection is verified during initial configuration.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
---
@@ -5578,7 +5596,7 @@ name: str
Name of the database connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
---
@@ -5592,7 +5610,7 @@ allowed_roles: typing.List[str]
A list of roles that are allowed to use this connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
---
@@ -5606,7 +5624,7 @@ auth_type: str
Specify alternative authorization type. (Only 'gcp_iam' is valid currently).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type}
---
@@ -5620,7 +5638,7 @@ connection_url: str
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
---
@@ -5634,7 +5652,7 @@ data: typing.Mapping[str]
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
---
@@ -5648,7 +5666,7 @@ max_connection_lifetime: typing.Union[int, float]
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
---
@@ -5662,7 +5680,7 @@ max_idle_connections: typing.Union[int, float]
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
---
@@ -5676,7 +5694,7 @@ max_open_connections: typing.Union[int, float]
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
---
@@ -5690,7 +5708,7 @@ password: str
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
---
@@ -5706,7 +5724,7 @@ Specifies the name of the plugin to use for this connection.
Must be prefixed with the name of one of the supported database engine types.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
---
@@ -5720,7 +5738,7 @@ root_rotation_statements: typing.List[str]
A list of database statements to be executed to rotate the root user's credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
---
@@ -5734,7 +5752,7 @@ service_account_json: str
A JSON encoded credential for use with IAM authorization.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json}
---
@@ -5748,7 +5766,7 @@ tls_ca: str
x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca}
---
@@ -5764,7 +5782,7 @@ x509 certificate for connecting to the database.
This must be a PEM encoded version of the private key and the certificate combined.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key}
---
@@ -5778,7 +5796,7 @@ username: str
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
---
@@ -5792,7 +5810,7 @@ username_template: str
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
---
@@ -5806,7 +5824,7 @@ verify_connection: typing.Union[bool, IResolvable]
Specifies if the connection is verified during initial configuration.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
---
@@ -5872,7 +5890,7 @@ name: str
Name of the database connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
---
@@ -5886,7 +5904,7 @@ allowed_roles: typing.List[str]
A list of roles that are allowed to use this connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
---
@@ -5900,7 +5918,7 @@ auth_type: str
Specify alternative authorization type. (Only 'gcp_iam' is valid currently).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type}
---
@@ -5914,7 +5932,7 @@ connection_url: str
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
---
@@ -5928,7 +5946,7 @@ data: typing.Mapping[str]
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
---
@@ -5942,7 +5960,7 @@ max_connection_lifetime: typing.Union[int, float]
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
---
@@ -5956,7 +5974,7 @@ max_idle_connections: typing.Union[int, float]
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
---
@@ -5970,7 +5988,7 @@ max_open_connections: typing.Union[int, float]
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
---
@@ -5984,7 +6002,7 @@ password: str
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
---
@@ -6000,7 +6018,7 @@ Specifies the name of the plugin to use for this connection.
Must be prefixed with the name of one of the supported database engine types.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
---
@@ -6014,7 +6032,7 @@ root_rotation_statements: typing.List[str]
A list of database statements to be executed to rotate the root user's credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
---
@@ -6028,7 +6046,7 @@ service_account_json: str
A JSON encoded credential for use with IAM authorization.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json}
---
@@ -6042,7 +6060,7 @@ tls_ca: str
x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca}
---
@@ -6058,7 +6076,7 @@ x509 certificate for connecting to the database.
This must be a PEM encoded version of the private key and the certificate combined.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key}
---
@@ -6072,7 +6090,7 @@ username: str
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
---
@@ -6086,7 +6104,7 @@ username_template: str
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
---
@@ -6100,7 +6118,7 @@ verify_connection: typing.Union[bool, IResolvable]
Specifies if the connection is verified during initial configuration.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
---
@@ -6166,7 +6184,7 @@ name: str
Name of the database connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
---
@@ -6180,7 +6198,7 @@ allowed_roles: typing.List[str]
A list of roles that are allowed to use this connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
---
@@ -6194,7 +6212,7 @@ auth_type: str
Specify alternative authorization type. (Only 'gcp_iam' is valid currently).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type}
---
@@ -6208,7 +6226,7 @@ connection_url: str
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
---
@@ -6222,7 +6240,7 @@ data: typing.Mapping[str]
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
---
@@ -6236,7 +6254,7 @@ max_connection_lifetime: typing.Union[int, float]
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
---
@@ -6250,7 +6268,7 @@ max_idle_connections: typing.Union[int, float]
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
---
@@ -6264,7 +6282,7 @@ max_open_connections: typing.Union[int, float]
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
---
@@ -6278,7 +6296,7 @@ password: str
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
---
@@ -6294,7 +6312,7 @@ Specifies the name of the plugin to use for this connection.
Must be prefixed with the name of one of the supported database engine types.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
---
@@ -6308,7 +6326,7 @@ root_rotation_statements: typing.List[str]
A list of database statements to be executed to rotate the root user's credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
---
@@ -6322,7 +6340,7 @@ service_account_json: str
A JSON encoded credential for use with IAM authorization.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json}
---
@@ -6336,7 +6354,7 @@ tls_ca: str
x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca}
---
@@ -6352,7 +6370,7 @@ x509 certificate for connecting to the database.
This must be a PEM encoded version of the private key and the certificate combined.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key}
---
@@ -6366,7 +6384,7 @@ username: str
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
---
@@ -6380,7 +6398,7 @@ username_template: str
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
---
@@ -6394,7 +6412,7 @@ verify_connection: typing.Union[bool, IResolvable]
Specifies if the connection is verified during initial configuration.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
---
@@ -6456,7 +6474,7 @@ name: str
Name of the database connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
---
@@ -6470,7 +6488,7 @@ allowed_roles: typing.List[str]
A list of roles that are allowed to use this connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
---
@@ -6484,7 +6502,7 @@ connection_url: str
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
---
@@ -6498,7 +6516,7 @@ data: typing.Mapping[str]
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
---
@@ -6512,7 +6530,7 @@ disconnect_sessions: typing.Union[bool, IResolvable]
Set to true to disconnect any open sessions prior to running the revocation statements.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#disconnect_sessions DatabaseSecretsMount#disconnect_sessions}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#disconnect_sessions DatabaseSecretsMount#disconnect_sessions}
---
@@ -6526,7 +6544,7 @@ max_connection_lifetime: typing.Union[int, float]
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
---
@@ -6540,7 +6558,7 @@ max_idle_connections: typing.Union[int, float]
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
---
@@ -6554,7 +6572,7 @@ max_open_connections: typing.Union[int, float]
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
---
@@ -6568,7 +6586,7 @@ password: str
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
---
@@ -6584,7 +6602,7 @@ Specifies the name of the plugin to use for this connection.
Must be prefixed with the name of one of the supported database engine types.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
---
@@ -6598,7 +6616,7 @@ root_rotation_statements: typing.List[str]
A list of database statements to be executed to rotate the root user's credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
---
@@ -6612,7 +6630,7 @@ split_statements: typing.Union[bool, IResolvable]
Set to true in order to split statements after semi-colons.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#split_statements DatabaseSecretsMount#split_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#split_statements DatabaseSecretsMount#split_statements}
---
@@ -6626,7 +6644,7 @@ username: str
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
---
@@ -6640,7 +6658,7 @@ username_template: str
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
---
@@ -6654,7 +6672,7 @@ verify_connection: typing.Union[bool, IResolvable]
Specifies if the connection is verified during initial configuration.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
---
@@ -6677,8 +6695,12 @@ databaseSecretsMount.DatabaseSecretsMountPostgresql(
max_open_connections: typing.Union[int, float] = None,
password: str = None,
plugin_name: str = None,
+ private_key: str = None,
root_rotation_statements: typing.List[str] = None,
+ self_managed: typing.Union[bool, IResolvable] = None,
service_account_json: str = None,
+ tls_ca: str = None,
+ tls_certificate: str = None,
username: str = None,
username_template: str = None,
verify_connection: typing.Union[bool, IResolvable] = None
@@ -6700,8 +6722,12 @@ databaseSecretsMount.DatabaseSecretsMountPostgresql(
| max_open_connections
| typing.Union[int, float]
| Maximum number of open connections to the database. |
| password
| str
| The root credential password used in the connection URL. |
| plugin_name
| str
| Specifies the name of the plugin to use for this connection. |
+| private_key
| str
| The secret key used for the x509 client certificate. Must be PEM encoded. |
| root_rotation_statements
| typing.List[str]
| A list of database statements to be executed to rotate the root user's credentials. |
+| self_managed
| typing.Union[bool, cdktf.IResolvable]
| If set, allows onboarding static roles with a rootless connection configuration. |
| service_account_json
| str
| A JSON encoded credential for use with IAM authorization. |
+| tls_ca
| str
| The x509 CA file for validating the certificate presented by the PostgreSQL server. Must be PEM encoded. |
+| tls_certificate
| str
| The x509 client certificate for connecting to the database. Must be PEM encoded. |
| username
| str
| The root credential username used in the connection URL. |
| username_template
| str
| Username generation template. |
| verify_connection
| typing.Union[bool, cdktf.IResolvable]
| Specifies if the connection is verified during initial configuration. |
@@ -6718,7 +6744,7 @@ name: str
Name of the database connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
---
@@ -6732,7 +6758,7 @@ allowed_roles: typing.List[str]
A list of roles that are allowed to use this connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
---
@@ -6746,7 +6772,7 @@ auth_type: str
Specify alternative authorization type. (Only 'gcp_iam' is valid currently).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type}
---
@@ -6760,7 +6786,7 @@ connection_url: str
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
---
@@ -6774,7 +6800,7 @@ data: typing.Mapping[str]
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
---
@@ -6788,7 +6814,7 @@ disable_escaping: typing.Union[bool, IResolvable]
Disable special character escaping in username and password.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping}
---
@@ -6802,7 +6828,7 @@ max_connection_lifetime: typing.Union[int, float]
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
---
@@ -6816,7 +6842,7 @@ max_idle_connections: typing.Union[int, float]
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
---
@@ -6830,7 +6856,7 @@ max_open_connections: typing.Union[int, float]
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
---
@@ -6844,7 +6870,7 @@ password: str
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
---
@@ -6860,7 +6886,21 @@ Specifies the name of the plugin to use for this connection.
Must be prefixed with the name of one of the supported database engine types.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
+
+---
+
+##### `private_key`Optional
+
+```python
+private_key: str
+```
+
+- *Type:* str
+
+The secret key used for the x509 client certificate. Must be PEM encoded.
+
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#private_key DatabaseSecretsMount#private_key}
---
@@ -6874,7 +6914,21 @@ root_rotation_statements: typing.List[str]
A list of database statements to be executed to rotate the root user's credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
+
+---
+
+##### `self_managed`Optional
+
+```python
+self_managed: typing.Union[bool, IResolvable]
+```
+
+- *Type:* typing.Union[bool, cdktf.IResolvable]
+
+If set, allows onboarding static roles with a rootless connection configuration.
+
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#self_managed DatabaseSecretsMount#self_managed}
---
@@ -6888,7 +6942,35 @@ service_account_json: str
A JSON encoded credential for use with IAM authorization.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json}
+
+---
+
+##### `tls_ca`Optional
+
+```python
+tls_ca: str
+```
+
+- *Type:* str
+
+The x509 CA file for validating the certificate presented by the PostgreSQL server. Must be PEM encoded.
+
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca}
+
+---
+
+##### `tls_certificate`Optional
+
+```python
+tls_certificate: str
+```
+
+- *Type:* str
+
+The x509 client certificate for connecting to the database. Must be PEM encoded.
+
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_certificate DatabaseSecretsMount#tls_certificate}
---
@@ -6902,7 +6984,7 @@ username: str
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
---
@@ -6916,7 +6998,7 @@ username_template: str
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
---
@@ -6930,7 +7012,7 @@ verify_connection: typing.Union[bool, IResolvable]
Specifies if the connection is verified during initial configuration.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
---
@@ -6988,7 +7070,7 @@ host: str
Specifies the host to connect to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#host DatabaseSecretsMount#host}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#host DatabaseSecretsMount#host}
---
@@ -7002,7 +7084,7 @@ name: str
Name of the database connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
---
@@ -7016,7 +7098,7 @@ password: str
Specifies the password corresponding to the given username.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
---
@@ -7030,7 +7112,7 @@ username: str
Specifies the username for Vault to use.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
---
@@ -7044,7 +7126,7 @@ allowed_roles: typing.List[str]
A list of roles that are allowed to use this connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
---
@@ -7058,7 +7140,7 @@ ca_cert: str
The contents of a PEM-encoded CA cert file to use to verify the Redis server's identity.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#ca_cert DatabaseSecretsMount#ca_cert}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#ca_cert DatabaseSecretsMount#ca_cert}
---
@@ -7072,7 +7154,7 @@ data: typing.Mapping[str]
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
---
@@ -7086,7 +7168,7 @@ insecure_tls: typing.Union[bool, IResolvable]
Specifies whether to skip verification of the server certificate when using TLS.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls}
---
@@ -7102,7 +7184,7 @@ Specifies the name of the plugin to use for this connection.
Must be prefixed with the name of one of the supported database engine types.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
---
@@ -7116,7 +7198,7 @@ port: typing.Union[int, float]
The transport port to use to connect to Redis.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#port DatabaseSecretsMount#port}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#port DatabaseSecretsMount#port}
---
@@ -7130,7 +7212,7 @@ root_rotation_statements: typing.List[str]
A list of database statements to be executed to rotate the root user's credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
---
@@ -7144,7 +7226,7 @@ tls: typing.Union[bool, IResolvable]
Specifies whether to use TLS when connecting to Redis.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls}
---
@@ -7158,7 +7240,7 @@ verify_connection: typing.Union[bool, IResolvable]
Specifies if the connection is verified during initial configuration.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
---
@@ -7210,7 +7292,7 @@ name: str
Name of the database connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
---
@@ -7224,7 +7306,7 @@ url: str
The configuration endpoint for the ElastiCache cluster to connect to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#url DatabaseSecretsMount#url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#url DatabaseSecretsMount#url}
---
@@ -7238,7 +7320,7 @@ allowed_roles: typing.List[str]
A list of roles that are allowed to use this connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
---
@@ -7252,7 +7334,7 @@ data: typing.Mapping[str]
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
---
@@ -7268,7 +7350,7 @@ The AWS secret key id to use to talk to ElastiCache.
If omitted the credentials chain provider is used instead.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
---
@@ -7284,7 +7366,7 @@ Specifies the name of the plugin to use for this connection.
Must be prefixed with the name of one of the supported database engine types.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
---
@@ -7300,7 +7382,7 @@ The AWS region where the ElastiCache cluster is hosted.
If omitted the plugin tries to infer the region from the environment.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#region DatabaseSecretsMount#region}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#region DatabaseSecretsMount#region}
---
@@ -7314,7 +7396,7 @@ root_rotation_statements: typing.List[str]
A list of database statements to be executed to rotate the root user's credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
---
@@ -7330,7 +7412,7 @@ The AWS access key id to use to talk to ElastiCache.
If omitted the credentials chain provider is used instead.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
---
@@ -7344,7 +7426,7 @@ verify_connection: typing.Union[bool, IResolvable]
Specifies if the connection is verified during initial configuration.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
---
@@ -7404,7 +7486,7 @@ name: str
Name of the database connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
---
@@ -7418,7 +7500,7 @@ allowed_roles: typing.List[str]
A list of roles that are allowed to use this connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
---
@@ -7432,7 +7514,7 @@ connection_url: str
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
---
@@ -7446,7 +7528,7 @@ data: typing.Mapping[str]
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
---
@@ -7460,7 +7542,7 @@ disable_escaping: typing.Union[bool, IResolvable]
Disable special character escaping in username and password.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping}
---
@@ -7474,7 +7556,7 @@ max_connection_lifetime: typing.Union[int, float]
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
---
@@ -7488,7 +7570,7 @@ max_idle_connections: typing.Union[int, float]
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
---
@@ -7502,7 +7584,7 @@ max_open_connections: typing.Union[int, float]
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
---
@@ -7516,7 +7598,7 @@ password: str
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
---
@@ -7532,7 +7614,7 @@ Specifies the name of the plugin to use for this connection.
Must be prefixed with the name of one of the supported database engine types.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
---
@@ -7546,7 +7628,7 @@ root_rotation_statements: typing.List[str]
A list of database statements to be executed to rotate the root user's credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
---
@@ -7560,7 +7642,7 @@ username: str
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
---
@@ -7574,7 +7656,7 @@ username_template: str
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
---
@@ -7588,7 +7670,7 @@ verify_connection: typing.Union[bool, IResolvable]
Specifies if the connection is verified during initial configuration.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
---
@@ -7646,7 +7728,7 @@ name: str
Name of the database connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
---
@@ -7660,7 +7742,7 @@ allowed_roles: typing.List[str]
A list of roles that are allowed to use this connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
---
@@ -7674,7 +7756,7 @@ connection_url: str
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
---
@@ -7688,7 +7770,7 @@ data: typing.Mapping[str]
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
---
@@ -7702,7 +7784,7 @@ max_connection_lifetime: typing.Union[int, float]
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
---
@@ -7716,7 +7798,7 @@ max_idle_connections: typing.Union[int, float]
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
---
@@ -7730,7 +7812,7 @@ max_open_connections: typing.Union[int, float]
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
---
@@ -7744,7 +7826,7 @@ password: str
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
---
@@ -7760,7 +7842,7 @@ Specifies the name of the plugin to use for this connection.
Must be prefixed with the name of one of the supported database engine types.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
---
@@ -7774,7 +7856,7 @@ root_rotation_statements: typing.List[str]
A list of database statements to be executed to rotate the root user's credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
---
@@ -7788,7 +7870,7 @@ username: str
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
---
@@ -7802,7 +7884,7 @@ username_template: str
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
---
@@ -7816,7 +7898,7 @@ verify_connection: typing.Union[bool, IResolvable]
Specifies if the connection is verified during initial configuration.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
---
@@ -8077,6 +8159,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it
| reset_port
| *No description.* |
| reset_protocol_version
| *No description.* |
| reset_root_rotation_statements
| *No description.* |
+| reset_skip_verification
| *No description.* |
| reset_tls
| *No description.* |
| reset_username
| *No description.* |
| reset_verify_connection
| *No description.* |
@@ -8327,6 +8410,12 @@ def reset_protocol_version() -> None
def reset_root_rotation_statements() -> None
```
+##### `reset_skip_verification`
+
+```python
+def reset_skip_verification() -> None
+```
+
##### `reset_tls`
```python
@@ -8365,6 +8454,7 @@ def reset_verify_connection() -> None
| port_input
| typing.Union[int, float]
| *No description.* |
| protocol_version_input
| typing.Union[int, float]
| *No description.* |
| root_rotation_statements_input
| typing.List[str]
| *No description.* |
+| skip_verification_input
| typing.Union[bool, cdktf.IResolvable]
| *No description.* |
| tls_input
| typing.Union[bool, cdktf.IResolvable]
| *No description.* |
| username_input
| str
| *No description.* |
| verify_connection_input
| typing.Union[bool, cdktf.IResolvable]
| *No description.* |
@@ -8381,6 +8471,7 @@ def reset_verify_connection() -> None
| port
| typing.Union[int, float]
| *No description.* |
| protocol_version
| typing.Union[int, float]
| *No description.* |
| root_rotation_statements
| typing.List[str]
| *No description.* |
+| skip_verification
| typing.Union[bool, cdktf.IResolvable]
| *No description.* |
| tls
| typing.Union[bool, cdktf.IResolvable]
| *No description.* |
| username
| str
| *No description.* |
| verify_connection
| typing.Union[bool, cdktf.IResolvable]
| *No description.* |
@@ -8542,6 +8633,16 @@ root_rotation_statements_input: typing.List[str]
---
+##### `skip_verification_input`Optional
+
+```python
+skip_verification_input: typing.Union[bool, IResolvable]
+```
+
+- *Type:* typing.Union[bool, cdktf.IResolvable]
+
+---
+
##### `tls_input`Optional
```python
@@ -8702,6 +8803,16 @@ root_rotation_statements: typing.List[str]
---
+##### `skip_verification`Required
+
+```python
+skip_verification: typing.Union[bool, IResolvable]
+```
+
+- *Type:* typing.Union[bool, cdktf.IResolvable]
+
+---
+
##### `tls`Required
```python
@@ -19587,8 +19698,12 @@ whether the list is wrapping a set (will add tolist() to be able to access an it
| reset_max_open_connections
| *No description.* |
| reset_password
| *No description.* |
| reset_plugin_name
| *No description.* |
+| reset_private_key
| *No description.* |
| reset_root_rotation_statements
| *No description.* |
+| reset_self_managed
| *No description.* |
| reset_service_account_json
| *No description.* |
+| reset_tls_ca
| *No description.* |
+| reset_tls_certificate
| *No description.* |
| reset_username
| *No description.* |
| reset_username_template
| *No description.* |
| reset_verify_connection
| *No description.* |
@@ -19827,18 +19942,42 @@ def reset_password() -> None
def reset_plugin_name() -> None
```
+##### `reset_private_key`
+
+```python
+def reset_private_key() -> None
+```
+
##### `reset_root_rotation_statements`
```python
def reset_root_rotation_statements() -> None
```
+##### `reset_self_managed`
+
+```python
+def reset_self_managed() -> None
+```
+
##### `reset_service_account_json`
```python
def reset_service_account_json() -> None
```
+##### `reset_tls_ca`
+
+```python
+def reset_tls_ca() -> None
+```
+
+##### `reset_tls_certificate`
+
+```python
+def reset_tls_certificate() -> None
+```
+
##### `reset_username`
```python
@@ -19875,8 +20014,12 @@ def reset_verify_connection() -> None
| name_input
| str
| *No description.* |
| password_input
| str
| *No description.* |
| plugin_name_input
| str
| *No description.* |
+| private_key_input
| str
| *No description.* |
| root_rotation_statements_input
| typing.List[str]
| *No description.* |
+| self_managed_input
| typing.Union[bool, cdktf.IResolvable]
| *No description.* |
| service_account_json_input
| str
| *No description.* |
+| tls_ca_input
| str
| *No description.* |
+| tls_certificate_input
| str
| *No description.* |
| username_input
| str
| *No description.* |
| username_template_input
| str
| *No description.* |
| verify_connection_input
| typing.Union[bool, cdktf.IResolvable]
| *No description.* |
@@ -19891,8 +20034,12 @@ def reset_verify_connection() -> None
| name
| str
| *No description.* |
| password
| str
| *No description.* |
| plugin_name
| str
| *No description.* |
+| private_key
| str
| *No description.* |
| root_rotation_statements
| typing.List[str]
| *No description.* |
+| self_managed
| typing.Union[bool, cdktf.IResolvable]
| *No description.* |
| service_account_json
| str
| *No description.* |
+| tls_ca
| str
| *No description.* |
+| tls_certificate
| str
| *No description.* |
| username
| str
| *No description.* |
| username_template
| str
| *No description.* |
| verify_connection
| typing.Union[bool, cdktf.IResolvable]
| *No description.* |
@@ -20034,6 +20181,16 @@ plugin_name_input: str
---
+##### `private_key_input`Optional
+
+```python
+private_key_input: str
+```
+
+- *Type:* str
+
+---
+
##### `root_rotation_statements_input`Optional
```python
@@ -20044,6 +20201,16 @@ root_rotation_statements_input: typing.List[str]
---
+##### `self_managed_input`Optional
+
+```python
+self_managed_input: typing.Union[bool, IResolvable]
+```
+
+- *Type:* typing.Union[bool, cdktf.IResolvable]
+
+---
+
##### `service_account_json_input`Optional
```python
@@ -20054,6 +20221,26 @@ service_account_json_input: str
---
+##### `tls_ca_input`Optional
+
+```python
+tls_ca_input: str
+```
+
+- *Type:* str
+
+---
+
+##### `tls_certificate_input`Optional
+
+```python
+tls_certificate_input: str
+```
+
+- *Type:* str
+
+---
+
##### `username_input`Optional
```python
@@ -20194,6 +20381,16 @@ plugin_name: str
---
+##### `private_key`Required
+
+```python
+private_key: str
+```
+
+- *Type:* str
+
+---
+
##### `root_rotation_statements`Required
```python
@@ -20204,6 +20401,16 @@ root_rotation_statements: typing.List[str]
---
+##### `self_managed`Required
+
+```python
+self_managed: typing.Union[bool, IResolvable]
+```
+
+- *Type:* typing.Union[bool, cdktf.IResolvable]
+
+---
+
##### `service_account_json`Required
```python
@@ -20214,6 +20421,26 @@ service_account_json: str
---
+##### `tls_ca`Required
+
+```python
+tls_ca: str
+```
+
+- *Type:* str
+
+---
+
+##### `tls_certificate`Required
+
+```python
+tls_certificate: str
+```
+
+- *Type:* str
+
+---
+
##### `username`Required
```python
diff --git a/docs/databaseSecretsMount.typescript.md b/docs/databaseSecretsMount.typescript.md
index de203340..d1b725f2 100644
--- a/docs/databaseSecretsMount.typescript.md
+++ b/docs/databaseSecretsMount.typescript.md
@@ -4,7 +4,7 @@
### DatabaseSecretsMount
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount vault_database_secrets_mount}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount vault_database_secrets_mount}.
#### Initializers
@@ -953,7 +953,7 @@ The construct id used in the generated config for the DatabaseSecretsMount to im
The id of the existing DatabaseSecretsMount that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#import import section} in the documentation of this resource for the id to use
---
@@ -2011,6 +2011,7 @@ const databaseSecretsMountCassandra: databaseSecretsMount.DatabaseSecretsMountCa
| port
| number
| The transport port to use to connect to Cassandra. |
| protocolVersion
| number
| The CQL protocol version to use. |
| rootRotationStatements
| string[]
| A list of database statements to be executed to rotate the root user's credentials. |
+| skipVerification
| boolean \| cdktf.IResolvable
| Skip permissions checks when a connection to Cassandra is first created. |
| tls
| boolean \| cdktf.IResolvable
| Whether to use TLS when connecting to Cassandra. |
| username
| string
| The username to use when authenticating with Cassandra. |
| verifyConnection
| boolean \| cdktf.IResolvable
| Specifies if the connection is verified during initial configuration. |
@@ -2027,7 +2028,7 @@ public readonly name: string;
Name of the database connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
---
@@ -2041,7 +2042,7 @@ public readonly allowedRoles: string[];
A list of roles that are allowed to use this connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
---
@@ -2055,7 +2056,7 @@ public readonly connectTimeout: number;
The number of seconds to use as a connection timeout.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connect_timeout DatabaseSecretsMount#connect_timeout}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connect_timeout DatabaseSecretsMount#connect_timeout}
---
@@ -2069,7 +2070,7 @@ public readonly data: {[ key: string ]: string};
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
---
@@ -2083,7 +2084,7 @@ public readonly hosts: string[];
Cassandra hosts to connect to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#hosts DatabaseSecretsMount#hosts}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#hosts DatabaseSecretsMount#hosts}
---
@@ -2097,7 +2098,7 @@ public readonly insecureTls: boolean | IResolvable;
Whether to skip verification of the server certificate when using TLS.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls}
---
@@ -2111,7 +2112,7 @@ public readonly password: string;
The password to use when authenticating with Cassandra.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
---
@@ -2127,7 +2128,7 @@ Concatenated PEM blocks containing a certificate and private key;
a certificate, private key, and issuing CA certificate; or just a CA certificate.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#pem_bundle DatabaseSecretsMount#pem_bundle}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#pem_bundle DatabaseSecretsMount#pem_bundle}
---
@@ -2143,7 +2144,7 @@ Specifies JSON containing a certificate and private key;
a certificate, private key, and issuing CA certificate; or just a CA certificate.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#pem_json DatabaseSecretsMount#pem_json}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#pem_json DatabaseSecretsMount#pem_json}
---
@@ -2159,7 +2160,7 @@ Specifies the name of the plugin to use for this connection.
Must be prefixed with the name of one of the supported database engine types.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
---
@@ -2173,7 +2174,7 @@ public readonly port: number;
The transport port to use to connect to Cassandra.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#port DatabaseSecretsMount#port}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#port DatabaseSecretsMount#port}
---
@@ -2187,7 +2188,7 @@ public readonly protocolVersion: number;
The CQL protocol version to use.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#protocol_version DatabaseSecretsMount#protocol_version}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#protocol_version DatabaseSecretsMount#protocol_version}
---
@@ -2201,7 +2202,23 @@ public readonly rootRotationStatements: string[];
A list of database statements to be executed to rotate the root user's credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
+
+---
+
+##### `skipVerification`Optional
+
+```typescript
+public readonly skipVerification: boolean | IResolvable;
+```
+
+- *Type:* boolean | cdktf.IResolvable
+
+Skip permissions checks when a connection to Cassandra is first created.
+
+These checks ensure that Vault is able to create roles, but can be resource intensive in clusters with many roles.
+
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#skip_verification DatabaseSecretsMount#skip_verification}
---
@@ -2215,7 +2232,7 @@ public readonly tls: boolean | IResolvable;
Whether to use TLS when connecting to Cassandra.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls}
---
@@ -2229,7 +2246,7 @@ public readonly username: string;
The username to use when authenticating with Cassandra.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
---
@@ -2243,7 +2260,7 @@ public readonly verifyConnection: boolean | IResolvable;
Specifies if the connection is verified during initial configuration.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
---
@@ -2281,7 +2298,7 @@ const databaseSecretsMountConfig: databaseSecretsMount.DatabaseSecretsMountConfi
| elasticsearch
| cdktf.IResolvable \| DatabaseSecretsMountElasticsearch[]
| elasticsearch block. |
| externalEntropyAccess
| boolean \| cdktf.IResolvable
| Enable the secrets engine to access Vault's external entropy source. |
| hana
| cdktf.IResolvable \| DatabaseSecretsMountHana[]
| hana block. |
-| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#id DatabaseSecretsMount#id}. |
+| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#id DatabaseSecretsMount#id}. |
| identityTokenKey
| string
| The key to use for signing plugin workload identity tokens. |
| influxdb
| cdktf.IResolvable \| DatabaseSecretsMountInfluxdb[]
| influxdb block. |
| listingVisibility
| string
| Specifies whether to show this mount in the UI-specific listing endpoint. |
@@ -2388,7 +2405,7 @@ public readonly path: string;
Where the secret backend will be mounted.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#path DatabaseSecretsMount#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#path DatabaseSecretsMount#path}
---
@@ -2402,7 +2419,7 @@ public readonly allowedManagedKeys: string[];
List of managed key registry entry names that the mount in question is allowed to access.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_managed_keys DatabaseSecretsMount#allowed_managed_keys}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_managed_keys DatabaseSecretsMount#allowed_managed_keys}
---
@@ -2416,7 +2433,7 @@ public readonly allowedResponseHeaders: string[];
List of headers to allow and pass from the request to the plugin.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_response_headers DatabaseSecretsMount#allowed_response_headers}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_response_headers DatabaseSecretsMount#allowed_response_headers}
---
@@ -2430,7 +2447,7 @@ public readonly auditNonHmacRequestKeys: string[];
Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#audit_non_hmac_request_keys DatabaseSecretsMount#audit_non_hmac_request_keys}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#audit_non_hmac_request_keys DatabaseSecretsMount#audit_non_hmac_request_keys}
---
@@ -2444,7 +2461,7 @@ public readonly auditNonHmacResponseKeys: string[];
Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#audit_non_hmac_response_keys DatabaseSecretsMount#audit_non_hmac_response_keys}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#audit_non_hmac_response_keys DatabaseSecretsMount#audit_non_hmac_response_keys}
---
@@ -2458,7 +2475,7 @@ public readonly cassandra: IResolvable | DatabaseSecretsMountCassandra[];
cassandra block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#cassandra DatabaseSecretsMount#cassandra}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#cassandra DatabaseSecretsMount#cassandra}
---
@@ -2472,7 +2489,7 @@ public readonly couchbase: IResolvable | DatabaseSecretsMountCouchbase[];
couchbase block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#couchbase DatabaseSecretsMount#couchbase}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#couchbase DatabaseSecretsMount#couchbase}
---
@@ -2486,7 +2503,7 @@ public readonly defaultLeaseTtlSeconds: number;
Default lease duration for tokens and secrets in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#default_lease_ttl_seconds DatabaseSecretsMount#default_lease_ttl_seconds}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#default_lease_ttl_seconds DatabaseSecretsMount#default_lease_ttl_seconds}
---
@@ -2500,7 +2517,7 @@ public readonly delegatedAuthAccessors: string[];
List of headers to allow and pass from the request to the plugin.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#delegated_auth_accessors DatabaseSecretsMount#delegated_auth_accessors}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#delegated_auth_accessors DatabaseSecretsMount#delegated_auth_accessors}
---
@@ -2514,7 +2531,7 @@ public readonly description: string;
Human-friendly description of the mount.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#description DatabaseSecretsMount#description}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#description DatabaseSecretsMount#description}
---
@@ -2528,7 +2545,7 @@ public readonly elasticsearch: IResolvable | DatabaseSecretsMountElasticsearch[]
elasticsearch block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#elasticsearch DatabaseSecretsMount#elasticsearch}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#elasticsearch DatabaseSecretsMount#elasticsearch}
---
@@ -2542,7 +2559,7 @@ public readonly externalEntropyAccess: boolean | IResolvable;
Enable the secrets engine to access Vault's external entropy source.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#external_entropy_access DatabaseSecretsMount#external_entropy_access}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#external_entropy_access DatabaseSecretsMount#external_entropy_access}
---
@@ -2556,7 +2573,7 @@ public readonly hana: IResolvable | DatabaseSecretsMountHana[];
hana block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#hana DatabaseSecretsMount#hana}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#hana DatabaseSecretsMount#hana}
---
@@ -2568,7 +2585,7 @@ public readonly id: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#id DatabaseSecretsMount#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#id DatabaseSecretsMount#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -2585,7 +2602,7 @@ public readonly identityTokenKey: string;
The key to use for signing plugin workload identity tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#identity_token_key DatabaseSecretsMount#identity_token_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#identity_token_key DatabaseSecretsMount#identity_token_key}
---
@@ -2599,7 +2616,7 @@ public readonly influxdb: IResolvable | DatabaseSecretsMountInfluxdb[];
influxdb block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#influxdb DatabaseSecretsMount#influxdb}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#influxdb DatabaseSecretsMount#influxdb}
---
@@ -2613,7 +2630,7 @@ public readonly listingVisibility: string;
Specifies whether to show this mount in the UI-specific listing endpoint.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#listing_visibility DatabaseSecretsMount#listing_visibility}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#listing_visibility DatabaseSecretsMount#listing_visibility}
---
@@ -2627,7 +2644,7 @@ public readonly local: boolean | IResolvable;
Local mount flag that can be explicitly set to true to enforce local mount in HA environment.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#local DatabaseSecretsMount#local}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#local DatabaseSecretsMount#local}
---
@@ -2641,7 +2658,7 @@ public readonly maxLeaseTtlSeconds: number;
Maximum possible lease duration for tokens and secrets in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_lease_ttl_seconds DatabaseSecretsMount#max_lease_ttl_seconds}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_lease_ttl_seconds DatabaseSecretsMount#max_lease_ttl_seconds}
---
@@ -2655,7 +2672,7 @@ public readonly mongodb: IResolvable | DatabaseSecretsMountMongodb[];
mongodb block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#mongodb DatabaseSecretsMount#mongodb}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#mongodb DatabaseSecretsMount#mongodb}
---
@@ -2669,7 +2686,7 @@ public readonly mongodbatlas: IResolvable | DatabaseSecretsMountMongodbatlas[];
mongodbatlas block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#mongodbatlas DatabaseSecretsMount#mongodbatlas}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#mongodbatlas DatabaseSecretsMount#mongodbatlas}
---
@@ -2683,7 +2700,7 @@ public readonly mssql: IResolvable | DatabaseSecretsMountMssql[];
mssql block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#mssql DatabaseSecretsMount#mssql}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#mssql DatabaseSecretsMount#mssql}
---
@@ -2697,7 +2714,7 @@ public readonly mysql: IResolvable | DatabaseSecretsMountMysql[];
mysql block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#mysql DatabaseSecretsMount#mysql}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#mysql DatabaseSecretsMount#mysql}
---
@@ -2711,7 +2728,7 @@ public readonly mysqlAurora: IResolvable | DatabaseSecretsMountMysqlAurora[];
mysql_aurora block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#mysql_aurora DatabaseSecretsMount#mysql_aurora}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#mysql_aurora DatabaseSecretsMount#mysql_aurora}
---
@@ -2725,7 +2742,7 @@ public readonly mysqlLegacy: IResolvable | DatabaseSecretsMountMysqlLegacy[];
mysql_legacy block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#mysql_legacy DatabaseSecretsMount#mysql_legacy}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#mysql_legacy DatabaseSecretsMount#mysql_legacy}
---
@@ -2739,7 +2756,7 @@ public readonly mysqlRds: IResolvable | DatabaseSecretsMountMysqlRds[];
mysql_rds block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#mysql_rds DatabaseSecretsMount#mysql_rds}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#mysql_rds DatabaseSecretsMount#mysql_rds}
---
@@ -2753,7 +2770,7 @@ public readonly namespace: string;
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#namespace DatabaseSecretsMount#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#namespace DatabaseSecretsMount#namespace}
---
@@ -2767,7 +2784,7 @@ public readonly options: {[ key: string ]: string};
Specifies mount type specific options that are passed to the backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#options DatabaseSecretsMount#options}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#options DatabaseSecretsMount#options}
---
@@ -2781,7 +2798,7 @@ public readonly oracle: IResolvable | DatabaseSecretsMountOracle[];
oracle block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#oracle DatabaseSecretsMount#oracle}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#oracle DatabaseSecretsMount#oracle}
---
@@ -2795,7 +2812,7 @@ public readonly passthroughRequestHeaders: string[];
List of headers to allow and pass from the request to the plugin.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#passthrough_request_headers DatabaseSecretsMount#passthrough_request_headers}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#passthrough_request_headers DatabaseSecretsMount#passthrough_request_headers}
---
@@ -2809,7 +2826,7 @@ public readonly pluginVersion: string;
Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_version DatabaseSecretsMount#plugin_version}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_version DatabaseSecretsMount#plugin_version}
---
@@ -2823,7 +2840,7 @@ public readonly postgresql: IResolvable | DatabaseSecretsMountPostgresql[];
postgresql block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#postgresql DatabaseSecretsMount#postgresql}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#postgresql DatabaseSecretsMount#postgresql}
---
@@ -2837,7 +2854,7 @@ public readonly redis: IResolvable | DatabaseSecretsMountRedis[];
redis block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#redis DatabaseSecretsMount#redis}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#redis DatabaseSecretsMount#redis}
---
@@ -2851,7 +2868,7 @@ public readonly redisElasticache: IResolvable | DatabaseSecretsMountRedisElastic
redis_elasticache block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#redis_elasticache DatabaseSecretsMount#redis_elasticache}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#redis_elasticache DatabaseSecretsMount#redis_elasticache}
---
@@ -2865,7 +2882,7 @@ public readonly redshift: IResolvable | DatabaseSecretsMountRedshift[];
redshift block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#redshift DatabaseSecretsMount#redshift}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#redshift DatabaseSecretsMount#redshift}
---
@@ -2879,7 +2896,7 @@ public readonly sealWrap: boolean | IResolvable;
Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#seal_wrap DatabaseSecretsMount#seal_wrap}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#seal_wrap DatabaseSecretsMount#seal_wrap}
---
@@ -2893,7 +2910,7 @@ public readonly snowflake: IResolvable | DatabaseSecretsMountSnowflake[];
snowflake block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#snowflake DatabaseSecretsMount#snowflake}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#snowflake DatabaseSecretsMount#snowflake}
---
@@ -2938,7 +2955,7 @@ public readonly hosts: string[];
A set of Couchbase URIs to connect to. Must use `couchbases://` scheme if `tls` is `true`.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#hosts DatabaseSecretsMount#hosts}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#hosts DatabaseSecretsMount#hosts}
---
@@ -2952,7 +2969,7 @@ public readonly name: string;
Name of the database connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
---
@@ -2966,7 +2983,7 @@ public readonly password: string;
Specifies the password corresponding to the given username.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
---
@@ -2980,7 +2997,7 @@ public readonly username: string;
Specifies the username for Vault to use.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
---
@@ -2994,7 +3011,7 @@ public readonly allowedRoles: string[];
A list of roles that are allowed to use this connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
---
@@ -3010,7 +3027,7 @@ Required if `tls` is `true`.
Specifies the certificate authority of the Couchbase server, as a PEM certificate that has been base64 encoded.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#base64_pem DatabaseSecretsMount#base64_pem}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#base64_pem DatabaseSecretsMount#base64_pem}
---
@@ -3024,7 +3041,7 @@ public readonly bucketName: string;
Required for Couchbase versions prior to 6.5.0. This is only used to verify vault's connection to the server.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#bucket_name DatabaseSecretsMount#bucket_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#bucket_name DatabaseSecretsMount#bucket_name}
---
@@ -3038,7 +3055,7 @@ public readonly data: {[ key: string ]: string};
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
---
@@ -3052,7 +3069,7 @@ public readonly insecureTls: boolean | IResolvable;
Specifies whether to skip verification of the server certificate when using TLS.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls}
---
@@ -3068,7 +3085,7 @@ Specifies the name of the plugin to use for this connection.
Must be prefixed with the name of one of the supported database engine types.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
---
@@ -3082,7 +3099,7 @@ public readonly rootRotationStatements: string[];
A list of database statements to be executed to rotate the root user's credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
---
@@ -3096,7 +3113,7 @@ public readonly tls: boolean | IResolvable;
Specifies whether to use TLS when connecting to Couchbase.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls}
---
@@ -3110,7 +3127,7 @@ public readonly usernameTemplate: string;
Template describing how dynamic usernames are generated.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
---
@@ -3124,7 +3141,7 @@ public readonly verifyConnection: boolean | IResolvable;
Specifies if the connection is verified during initial configuration.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
---
@@ -3171,7 +3188,7 @@ public readonly name: string;
Name of the database connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
---
@@ -3185,7 +3202,7 @@ public readonly password: string;
The password to be used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
---
@@ -3199,7 +3216,7 @@ public readonly url: string;
The URL for Elasticsearch's API.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#url DatabaseSecretsMount#url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#url DatabaseSecretsMount#url}
---
@@ -3213,7 +3230,7 @@ public readonly username: string;
The username to be used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
---
@@ -3227,7 +3244,7 @@ public readonly allowedRoles: string[];
A list of roles that are allowed to use this connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
---
@@ -3241,7 +3258,7 @@ public readonly caCert: string;
The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#ca_cert DatabaseSecretsMount#ca_cert}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#ca_cert DatabaseSecretsMount#ca_cert}
---
@@ -3255,7 +3272,7 @@ public readonly caPath: string;
The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#ca_path DatabaseSecretsMount#ca_path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#ca_path DatabaseSecretsMount#ca_path}
---
@@ -3269,7 +3286,7 @@ public readonly clientCert: string;
The path to the certificate for the Elasticsearch client to present for communication.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#client_cert DatabaseSecretsMount#client_cert}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#client_cert DatabaseSecretsMount#client_cert}
---
@@ -3283,7 +3300,7 @@ public readonly clientKey: string;
The path to the key for the Elasticsearch client to use for communication.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#client_key DatabaseSecretsMount#client_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#client_key DatabaseSecretsMount#client_key}
---
@@ -3297,7 +3314,7 @@ public readonly data: {[ key: string ]: string};
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
---
@@ -3311,7 +3328,7 @@ public readonly insecure: boolean | IResolvable;
Whether to disable certificate verification.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#insecure DatabaseSecretsMount#insecure}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#insecure DatabaseSecretsMount#insecure}
---
@@ -3327,7 +3344,7 @@ Specifies the name of the plugin to use for this connection.
Must be prefixed with the name of one of the supported database engine types.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
---
@@ -3341,7 +3358,7 @@ public readonly rootRotationStatements: string[];
A list of database statements to be executed to rotate the root user's credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
---
@@ -3355,7 +3372,7 @@ public readonly tlsServerName: string;
This, if set, is used to set the SNI host when connecting via TLS.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls_server_name DatabaseSecretsMount#tls_server_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_server_name DatabaseSecretsMount#tls_server_name}
---
@@ -3369,7 +3386,7 @@ public readonly usernameTemplate: string;
Template describing how dynamic usernames are generated.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
---
@@ -3383,7 +3400,7 @@ public readonly verifyConnection: boolean | IResolvable;
Specifies if the connection is verified during initial configuration.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
---
@@ -3427,7 +3444,7 @@ public readonly name: string;
Name of the database connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
---
@@ -3441,7 +3458,7 @@ public readonly allowedRoles: string[];
A list of roles that are allowed to use this connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
---
@@ -3455,7 +3472,7 @@ public readonly connectionUrl: string;
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
---
@@ -3469,7 +3486,7 @@ public readonly data: {[ key: string ]: string};
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
---
@@ -3483,7 +3500,7 @@ public readonly disableEscaping: boolean | IResolvable;
Disable special character escaping in username and password.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping}
---
@@ -3497,7 +3514,7 @@ public readonly maxConnectionLifetime: number;
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
---
@@ -3511,7 +3528,7 @@ public readonly maxIdleConnections: number;
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
---
@@ -3525,7 +3542,7 @@ public readonly maxOpenConnections: number;
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
---
@@ -3539,7 +3556,7 @@ public readonly password: string;
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
---
@@ -3555,7 +3572,7 @@ Specifies the name of the plugin to use for this connection.
Must be prefixed with the name of one of the supported database engine types.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
---
@@ -3569,7 +3586,7 @@ public readonly rootRotationStatements: string[];
A list of database statements to be executed to rotate the root user's credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
---
@@ -3583,7 +3600,7 @@ public readonly username: string;
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
---
@@ -3597,7 +3614,7 @@ public readonly verifyConnection: boolean | IResolvable;
Specifies if the connection is verified during initial configuration.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
---
@@ -3644,7 +3661,7 @@ public readonly host: string;
Influxdb host to connect to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#host DatabaseSecretsMount#host}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#host DatabaseSecretsMount#host}
---
@@ -3658,7 +3675,7 @@ public readonly name: string;
Name of the database connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
---
@@ -3672,7 +3689,7 @@ public readonly password: string;
Specifies the password corresponding to the given username.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
---
@@ -3686,7 +3703,7 @@ public readonly username: string;
Specifies the username to use for superuser access.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
---
@@ -3700,7 +3717,7 @@ public readonly allowedRoles: string[];
A list of roles that are allowed to use this connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
---
@@ -3714,7 +3731,7 @@ public readonly connectTimeout: number;
The number of seconds to use as a connection timeout.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connect_timeout DatabaseSecretsMount#connect_timeout}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connect_timeout DatabaseSecretsMount#connect_timeout}
---
@@ -3728,7 +3745,7 @@ public readonly data: {[ key: string ]: string};
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
---
@@ -3742,7 +3759,7 @@ public readonly insecureTls: boolean | IResolvable;
Whether to skip verification of the server certificate when using TLS.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls}
---
@@ -3758,7 +3775,7 @@ Concatenated PEM blocks containing a certificate and private key;
a certificate, private key, and issuing CA certificate; or just a CA certificate.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#pem_bundle DatabaseSecretsMount#pem_bundle}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#pem_bundle DatabaseSecretsMount#pem_bundle}
---
@@ -3774,7 +3791,7 @@ Specifies JSON containing a certificate and private key;
a certificate, private key, and issuing CA certificate; or just a CA certificate.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#pem_json DatabaseSecretsMount#pem_json}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#pem_json DatabaseSecretsMount#pem_json}
---
@@ -3790,7 +3807,7 @@ Specifies the name of the plugin to use for this connection.
Must be prefixed with the name of one of the supported database engine types.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
---
@@ -3804,7 +3821,7 @@ public readonly port: number;
The transport port to use to connect to Influxdb.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#port DatabaseSecretsMount#port}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#port DatabaseSecretsMount#port}
---
@@ -3818,7 +3835,7 @@ public readonly rootRotationStatements: string[];
A list of database statements to be executed to rotate the root user's credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
---
@@ -3832,7 +3849,7 @@ public readonly tls: boolean | IResolvable;
Whether to use TLS when connecting to Influxdb.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls}
---
@@ -3846,7 +3863,7 @@ public readonly usernameTemplate: string;
Template describing how dynamic usernames are generated.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
---
@@ -3860,7 +3877,7 @@ public readonly verifyConnection: boolean | IResolvable;
Specifies if the connection is verified during initial configuration.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
---
@@ -3904,7 +3921,7 @@ public readonly name: string;
Name of the database connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
---
@@ -3918,7 +3935,7 @@ public readonly allowedRoles: string[];
A list of roles that are allowed to use this connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
---
@@ -3932,7 +3949,7 @@ public readonly connectionUrl: string;
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
---
@@ -3946,7 +3963,7 @@ public readonly data: {[ key: string ]: string};
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
---
@@ -3960,7 +3977,7 @@ public readonly maxConnectionLifetime: number;
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
---
@@ -3974,7 +3991,7 @@ public readonly maxIdleConnections: number;
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
---
@@ -3988,7 +4005,7 @@ public readonly maxOpenConnections: number;
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
---
@@ -4002,7 +4019,7 @@ public readonly password: string;
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
---
@@ -4018,7 +4035,7 @@ Specifies the name of the plugin to use for this connection.
Must be prefixed with the name of one of the supported database engine types.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
---
@@ -4032,7 +4049,7 @@ public readonly rootRotationStatements: string[];
A list of database statements to be executed to rotate the root user's credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
---
@@ -4046,7 +4063,7 @@ public readonly username: string;
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
---
@@ -4060,7 +4077,7 @@ public readonly usernameTemplate: string;
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
---
@@ -4074,7 +4091,7 @@ public readonly verifyConnection: boolean | IResolvable;
Specifies if the connection is verified during initial configuration.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
---
@@ -4114,7 +4131,7 @@ public readonly name: string;
Name of the database connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
---
@@ -4128,7 +4145,7 @@ public readonly privateKey: string;
The Private Programmatic API Key used to connect with MongoDB Atlas API.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#private_key DatabaseSecretsMount#private_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#private_key DatabaseSecretsMount#private_key}
---
@@ -4142,7 +4159,7 @@ public readonly projectId: string;
The Project ID the Database User should be created within.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#project_id DatabaseSecretsMount#project_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#project_id DatabaseSecretsMount#project_id}
---
@@ -4156,7 +4173,7 @@ public readonly publicKey: string;
The Public Programmatic API Key used to authenticate with the MongoDB Atlas API.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#public_key DatabaseSecretsMount#public_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#public_key DatabaseSecretsMount#public_key}
---
@@ -4170,7 +4187,7 @@ public readonly allowedRoles: string[];
A list of roles that are allowed to use this connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
---
@@ -4184,7 +4201,7 @@ public readonly data: {[ key: string ]: string};
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
---
@@ -4200,7 +4217,7 @@ Specifies the name of the plugin to use for this connection.
Must be prefixed with the name of one of the supported database engine types.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
---
@@ -4214,7 +4231,7 @@ public readonly rootRotationStatements: string[];
A list of database statements to be executed to rotate the root user's credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
---
@@ -4228,7 +4245,7 @@ public readonly verifyConnection: boolean | IResolvable;
Specifies if the connection is verified during initial configuration.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
---
@@ -4274,7 +4291,7 @@ public readonly name: string;
Name of the database connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
---
@@ -4288,7 +4305,7 @@ public readonly allowedRoles: string[];
A list of roles that are allowed to use this connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
---
@@ -4302,7 +4319,7 @@ public readonly connectionUrl: string;
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
---
@@ -4316,7 +4333,7 @@ public readonly containedDb: boolean | IResolvable;
Set to true when the target is a Contained Database, e.g. AzureSQL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#contained_db DatabaseSecretsMount#contained_db}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#contained_db DatabaseSecretsMount#contained_db}
---
@@ -4330,7 +4347,7 @@ public readonly data: {[ key: string ]: string};
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
---
@@ -4344,7 +4361,7 @@ public readonly disableEscaping: boolean | IResolvable;
Disable special character escaping in username and password.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping}
---
@@ -4358,7 +4375,7 @@ public readonly maxConnectionLifetime: number;
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
---
@@ -4372,7 +4389,7 @@ public readonly maxIdleConnections: number;
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
---
@@ -4386,7 +4403,7 @@ public readonly maxOpenConnections: number;
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
---
@@ -4400,7 +4417,7 @@ public readonly password: string;
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
---
@@ -4416,7 +4433,7 @@ Specifies the name of the plugin to use for this connection.
Must be prefixed with the name of one of the supported database engine types.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
---
@@ -4430,7 +4447,7 @@ public readonly rootRotationStatements: string[];
A list of database statements to be executed to rotate the root user's credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
---
@@ -4444,7 +4461,7 @@ public readonly username: string;
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
---
@@ -4458,7 +4475,7 @@ public readonly usernameTemplate: string;
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
---
@@ -4472,7 +4489,7 @@ public readonly verifyConnection: boolean | IResolvable;
Specifies if the connection is verified during initial configuration.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
---
@@ -4520,7 +4537,7 @@ public readonly name: string;
Name of the database connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
---
@@ -4534,7 +4551,7 @@ public readonly allowedRoles: string[];
A list of roles that are allowed to use this connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
---
@@ -4548,7 +4565,7 @@ public readonly authType: string;
Specify alternative authorization type. (Only 'gcp_iam' is valid currently).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type}
---
@@ -4562,7 +4579,7 @@ public readonly connectionUrl: string;
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
---
@@ -4576,7 +4593,7 @@ public readonly data: {[ key: string ]: string};
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
---
@@ -4590,7 +4607,7 @@ public readonly maxConnectionLifetime: number;
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
---
@@ -4604,7 +4621,7 @@ public readonly maxIdleConnections: number;
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
---
@@ -4618,7 +4635,7 @@ public readonly maxOpenConnections: number;
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
---
@@ -4632,7 +4649,7 @@ public readonly password: string;
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
---
@@ -4648,7 +4665,7 @@ Specifies the name of the plugin to use for this connection.
Must be prefixed with the name of one of the supported database engine types.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
---
@@ -4662,7 +4679,7 @@ public readonly rootRotationStatements: string[];
A list of database statements to be executed to rotate the root user's credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
---
@@ -4676,7 +4693,7 @@ public readonly serviceAccountJson: string;
A JSON encoded credential for use with IAM authorization.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json}
---
@@ -4690,7 +4707,7 @@ public readonly tlsCa: string;
x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca}
---
@@ -4706,7 +4723,7 @@ x509 certificate for connecting to the database.
This must be a PEM encoded version of the private key and the certificate combined.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key}
---
@@ -4720,7 +4737,7 @@ public readonly username: string;
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
---
@@ -4734,7 +4751,7 @@ public readonly usernameTemplate: string;
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
---
@@ -4748,7 +4765,7 @@ public readonly verifyConnection: boolean | IResolvable;
Specifies if the connection is verified during initial configuration.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
---
@@ -4796,7 +4813,7 @@ public readonly name: string;
Name of the database connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
---
@@ -4810,7 +4827,7 @@ public readonly allowedRoles: string[];
A list of roles that are allowed to use this connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
---
@@ -4824,7 +4841,7 @@ public readonly authType: string;
Specify alternative authorization type. (Only 'gcp_iam' is valid currently).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type}
---
@@ -4838,7 +4855,7 @@ public readonly connectionUrl: string;
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
---
@@ -4852,7 +4869,7 @@ public readonly data: {[ key: string ]: string};
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
---
@@ -4866,7 +4883,7 @@ public readonly maxConnectionLifetime: number;
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
---
@@ -4880,7 +4897,7 @@ public readonly maxIdleConnections: number;
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
---
@@ -4894,7 +4911,7 @@ public readonly maxOpenConnections: number;
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
---
@@ -4908,7 +4925,7 @@ public readonly password: string;
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
---
@@ -4924,7 +4941,7 @@ Specifies the name of the plugin to use for this connection.
Must be prefixed with the name of one of the supported database engine types.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
---
@@ -4938,7 +4955,7 @@ public readonly rootRotationStatements: string[];
A list of database statements to be executed to rotate the root user's credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
---
@@ -4952,7 +4969,7 @@ public readonly serviceAccountJson: string;
A JSON encoded credential for use with IAM authorization.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json}
---
@@ -4966,7 +4983,7 @@ public readonly tlsCa: string;
x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca}
---
@@ -4982,7 +4999,7 @@ x509 certificate for connecting to the database.
This must be a PEM encoded version of the private key and the certificate combined.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key}
---
@@ -4996,7 +5013,7 @@ public readonly username: string;
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
---
@@ -5010,7 +5027,7 @@ public readonly usernameTemplate: string;
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
---
@@ -5024,7 +5041,7 @@ public readonly verifyConnection: boolean | IResolvable;
Specifies if the connection is verified during initial configuration.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
---
@@ -5072,7 +5089,7 @@ public readonly name: string;
Name of the database connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
---
@@ -5086,7 +5103,7 @@ public readonly allowedRoles: string[];
A list of roles that are allowed to use this connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
---
@@ -5100,7 +5117,7 @@ public readonly authType: string;
Specify alternative authorization type. (Only 'gcp_iam' is valid currently).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type}
---
@@ -5114,7 +5131,7 @@ public readonly connectionUrl: string;
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
---
@@ -5128,7 +5145,7 @@ public readonly data: {[ key: string ]: string};
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
---
@@ -5142,7 +5159,7 @@ public readonly maxConnectionLifetime: number;
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
---
@@ -5156,7 +5173,7 @@ public readonly maxIdleConnections: number;
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
---
@@ -5170,7 +5187,7 @@ public readonly maxOpenConnections: number;
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
---
@@ -5184,7 +5201,7 @@ public readonly password: string;
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
---
@@ -5200,7 +5217,7 @@ Specifies the name of the plugin to use for this connection.
Must be prefixed with the name of one of the supported database engine types.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
---
@@ -5214,7 +5231,7 @@ public readonly rootRotationStatements: string[];
A list of database statements to be executed to rotate the root user's credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
---
@@ -5228,7 +5245,7 @@ public readonly serviceAccountJson: string;
A JSON encoded credential for use with IAM authorization.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json}
---
@@ -5242,7 +5259,7 @@ public readonly tlsCa: string;
x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca}
---
@@ -5258,7 +5275,7 @@ x509 certificate for connecting to the database.
This must be a PEM encoded version of the private key and the certificate combined.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key}
---
@@ -5272,7 +5289,7 @@ public readonly username: string;
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
---
@@ -5286,7 +5303,7 @@ public readonly usernameTemplate: string;
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
---
@@ -5300,7 +5317,7 @@ public readonly verifyConnection: boolean | IResolvable;
Specifies if the connection is verified during initial configuration.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
---
@@ -5348,7 +5365,7 @@ public readonly name: string;
Name of the database connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
---
@@ -5362,7 +5379,7 @@ public readonly allowedRoles: string[];
A list of roles that are allowed to use this connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
---
@@ -5376,7 +5393,7 @@ public readonly authType: string;
Specify alternative authorization type. (Only 'gcp_iam' is valid currently).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type}
---
@@ -5390,7 +5407,7 @@ public readonly connectionUrl: string;
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
---
@@ -5404,7 +5421,7 @@ public readonly data: {[ key: string ]: string};
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
---
@@ -5418,7 +5435,7 @@ public readonly maxConnectionLifetime: number;
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
---
@@ -5432,7 +5449,7 @@ public readonly maxIdleConnections: number;
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
---
@@ -5446,7 +5463,7 @@ public readonly maxOpenConnections: number;
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
---
@@ -5460,7 +5477,7 @@ public readonly password: string;
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
---
@@ -5476,7 +5493,7 @@ Specifies the name of the plugin to use for this connection.
Must be prefixed with the name of one of the supported database engine types.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
---
@@ -5490,7 +5507,7 @@ public readonly rootRotationStatements: string[];
A list of database statements to be executed to rotate the root user's credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
---
@@ -5504,7 +5521,7 @@ public readonly serviceAccountJson: string;
A JSON encoded credential for use with IAM authorization.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json}
---
@@ -5518,7 +5535,7 @@ public readonly tlsCa: string;
x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca}
---
@@ -5534,7 +5551,7 @@ x509 certificate for connecting to the database.
This must be a PEM encoded version of the private key and the certificate combined.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key}
---
@@ -5548,7 +5565,7 @@ public readonly username: string;
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
---
@@ -5562,7 +5579,7 @@ public readonly usernameTemplate: string;
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
---
@@ -5576,7 +5593,7 @@ public readonly verifyConnection: boolean | IResolvable;
Specifies if the connection is verified during initial configuration.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
---
@@ -5622,7 +5639,7 @@ public readonly name: string;
Name of the database connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
---
@@ -5636,7 +5653,7 @@ public readonly allowedRoles: string[];
A list of roles that are allowed to use this connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
---
@@ -5650,7 +5667,7 @@ public readonly connectionUrl: string;
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
---
@@ -5664,7 +5681,7 @@ public readonly data: {[ key: string ]: string};
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
---
@@ -5678,7 +5695,7 @@ public readonly disconnectSessions: boolean | IResolvable;
Set to true to disconnect any open sessions prior to running the revocation statements.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#disconnect_sessions DatabaseSecretsMount#disconnect_sessions}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#disconnect_sessions DatabaseSecretsMount#disconnect_sessions}
---
@@ -5692,7 +5709,7 @@ public readonly maxConnectionLifetime: number;
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
---
@@ -5706,7 +5723,7 @@ public readonly maxIdleConnections: number;
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
---
@@ -5720,7 +5737,7 @@ public readonly maxOpenConnections: number;
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
---
@@ -5734,7 +5751,7 @@ public readonly password: string;
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
---
@@ -5750,7 +5767,7 @@ Specifies the name of the plugin to use for this connection.
Must be prefixed with the name of one of the supported database engine types.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
---
@@ -5764,7 +5781,7 @@ public readonly rootRotationStatements: string[];
A list of database statements to be executed to rotate the root user's credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
---
@@ -5778,7 +5795,7 @@ public readonly splitStatements: boolean | IResolvable;
Set to true in order to split statements after semi-colons.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#split_statements DatabaseSecretsMount#split_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#split_statements DatabaseSecretsMount#split_statements}
---
@@ -5792,7 +5809,7 @@ public readonly username: string;
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
---
@@ -5806,7 +5823,7 @@ public readonly usernameTemplate: string;
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
---
@@ -5820,7 +5837,7 @@ public readonly verifyConnection: boolean | IResolvable;
Specifies if the connection is verified during initial configuration.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
---
@@ -5849,8 +5866,12 @@ const databaseSecretsMountPostgresql: databaseSecretsMount.DatabaseSecretsMountP
| maxOpenConnections
| number
| Maximum number of open connections to the database. |
| password
| string
| The root credential password used in the connection URL. |
| pluginName
| string
| Specifies the name of the plugin to use for this connection. |
+| privateKey
| string
| The secret key used for the x509 client certificate. Must be PEM encoded. |
| rootRotationStatements
| string[]
| A list of database statements to be executed to rotate the root user's credentials. |
+| selfManaged
| boolean \| cdktf.IResolvable
| If set, allows onboarding static roles with a rootless connection configuration. |
| serviceAccountJson
| string
| A JSON encoded credential for use with IAM authorization. |
+| tlsCa
| string
| The x509 CA file for validating the certificate presented by the PostgreSQL server. Must be PEM encoded. |
+| tlsCertificate
| string
| The x509 client certificate for connecting to the database. Must be PEM encoded. |
| username
| string
| The root credential username used in the connection URL. |
| usernameTemplate
| string
| Username generation template. |
| verifyConnection
| boolean \| cdktf.IResolvable
| Specifies if the connection is verified during initial configuration. |
@@ -5867,7 +5888,7 @@ public readonly name: string;
Name of the database connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
---
@@ -5881,7 +5902,7 @@ public readonly allowedRoles: string[];
A list of roles that are allowed to use this connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
---
@@ -5895,7 +5916,7 @@ public readonly authType: string;
Specify alternative authorization type. (Only 'gcp_iam' is valid currently).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type}
---
@@ -5909,7 +5930,7 @@ public readonly connectionUrl: string;
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
---
@@ -5923,7 +5944,7 @@ public readonly data: {[ key: string ]: string};
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
---
@@ -5937,7 +5958,7 @@ public readonly disableEscaping: boolean | IResolvable;
Disable special character escaping in username and password.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping}
---
@@ -5951,7 +5972,7 @@ public readonly maxConnectionLifetime: number;
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
---
@@ -5965,7 +5986,7 @@ public readonly maxIdleConnections: number;
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
---
@@ -5979,7 +6000,7 @@ public readonly maxOpenConnections: number;
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
---
@@ -5993,7 +6014,7 @@ public readonly password: string;
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
---
@@ -6009,7 +6030,21 @@ Specifies the name of the plugin to use for this connection.
Must be prefixed with the name of one of the supported database engine types.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
+
+---
+
+##### `privateKey`Optional
+
+```typescript
+public readonly privateKey: string;
+```
+
+- *Type:* string
+
+The secret key used for the x509 client certificate. Must be PEM encoded.
+
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#private_key DatabaseSecretsMount#private_key}
---
@@ -6023,7 +6058,21 @@ public readonly rootRotationStatements: string[];
A list of database statements to be executed to rotate the root user's credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
+
+---
+
+##### `selfManaged`Optional
+
+```typescript
+public readonly selfManaged: boolean | IResolvable;
+```
+
+- *Type:* boolean | cdktf.IResolvable
+
+If set, allows onboarding static roles with a rootless connection configuration.
+
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#self_managed DatabaseSecretsMount#self_managed}
---
@@ -6037,7 +6086,35 @@ public readonly serviceAccountJson: string;
A JSON encoded credential for use with IAM authorization.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json}
+
+---
+
+##### `tlsCa`Optional
+
+```typescript
+public readonly tlsCa: string;
+```
+
+- *Type:* string
+
+The x509 CA file for validating the certificate presented by the PostgreSQL server. Must be PEM encoded.
+
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca}
+
+---
+
+##### `tlsCertificate`Optional
+
+```typescript
+public readonly tlsCertificate: string;
+```
+
+- *Type:* string
+
+The x509 client certificate for connecting to the database. Must be PEM encoded.
+
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_certificate DatabaseSecretsMount#tls_certificate}
---
@@ -6051,7 +6128,7 @@ public readonly username: string;
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
---
@@ -6065,7 +6142,7 @@ public readonly usernameTemplate: string;
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
---
@@ -6079,7 +6156,7 @@ public readonly verifyConnection: boolean | IResolvable;
Specifies if the connection is verified during initial configuration.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
---
@@ -6123,7 +6200,7 @@ public readonly host: string;
Specifies the host to connect to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#host DatabaseSecretsMount#host}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#host DatabaseSecretsMount#host}
---
@@ -6137,7 +6214,7 @@ public readonly name: string;
Name of the database connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
---
@@ -6151,7 +6228,7 @@ public readonly password: string;
Specifies the password corresponding to the given username.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
---
@@ -6165,7 +6242,7 @@ public readonly username: string;
Specifies the username for Vault to use.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
---
@@ -6179,7 +6256,7 @@ public readonly allowedRoles: string[];
A list of roles that are allowed to use this connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
---
@@ -6193,7 +6270,7 @@ public readonly caCert: string;
The contents of a PEM-encoded CA cert file to use to verify the Redis server's identity.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#ca_cert DatabaseSecretsMount#ca_cert}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#ca_cert DatabaseSecretsMount#ca_cert}
---
@@ -6207,7 +6284,7 @@ public readonly data: {[ key: string ]: string};
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
---
@@ -6221,7 +6298,7 @@ public readonly insecureTls: boolean | IResolvable;
Specifies whether to skip verification of the server certificate when using TLS.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls}
---
@@ -6237,7 +6314,7 @@ Specifies the name of the plugin to use for this connection.
Must be prefixed with the name of one of the supported database engine types.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
---
@@ -6251,7 +6328,7 @@ public readonly port: number;
The transport port to use to connect to Redis.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#port DatabaseSecretsMount#port}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#port DatabaseSecretsMount#port}
---
@@ -6265,7 +6342,7 @@ public readonly rootRotationStatements: string[];
A list of database statements to be executed to rotate the root user's credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
---
@@ -6279,7 +6356,7 @@ public readonly tls: boolean | IResolvable;
Specifies whether to use TLS when connecting to Redis.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls}
---
@@ -6293,7 +6370,7 @@ public readonly verifyConnection: boolean | IResolvable;
Specifies if the connection is verified during initial configuration.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
---
@@ -6334,7 +6411,7 @@ public readonly name: string;
Name of the database connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
---
@@ -6348,7 +6425,7 @@ public readonly url: string;
The configuration endpoint for the ElastiCache cluster to connect to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#url DatabaseSecretsMount#url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#url DatabaseSecretsMount#url}
---
@@ -6362,7 +6439,7 @@ public readonly allowedRoles: string[];
A list of roles that are allowed to use this connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
---
@@ -6376,7 +6453,7 @@ public readonly data: {[ key: string ]: string};
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
---
@@ -6392,7 +6469,7 @@ The AWS secret key id to use to talk to ElastiCache.
If omitted the credentials chain provider is used instead.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
---
@@ -6408,7 +6485,7 @@ Specifies the name of the plugin to use for this connection.
Must be prefixed with the name of one of the supported database engine types.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
---
@@ -6424,7 +6501,7 @@ The AWS region where the ElastiCache cluster is hosted.
If omitted the plugin tries to infer the region from the environment.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#region DatabaseSecretsMount#region}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#region DatabaseSecretsMount#region}
---
@@ -6438,7 +6515,7 @@ public readonly rootRotationStatements: string[];
A list of database statements to be executed to rotate the root user's credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
---
@@ -6454,7 +6531,7 @@ The AWS access key id to use to talk to ElastiCache.
If omitted the credentials chain provider is used instead.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
---
@@ -6468,7 +6545,7 @@ public readonly verifyConnection: boolean | IResolvable;
Specifies if the connection is verified during initial configuration.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
---
@@ -6513,7 +6590,7 @@ public readonly name: string;
Name of the database connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
---
@@ -6527,7 +6604,7 @@ public readonly allowedRoles: string[];
A list of roles that are allowed to use this connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
---
@@ -6541,7 +6618,7 @@ public readonly connectionUrl: string;
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
---
@@ -6555,7 +6632,7 @@ public readonly data: {[ key: string ]: string};
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
---
@@ -6569,7 +6646,7 @@ public readonly disableEscaping: boolean | IResolvable;
Disable special character escaping in username and password.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping}
---
@@ -6583,7 +6660,7 @@ public readonly maxConnectionLifetime: number;
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
---
@@ -6597,7 +6674,7 @@ public readonly maxIdleConnections: number;
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
---
@@ -6611,7 +6688,7 @@ public readonly maxOpenConnections: number;
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
---
@@ -6625,7 +6702,7 @@ public readonly password: string;
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
---
@@ -6641,7 +6718,7 @@ Specifies the name of the plugin to use for this connection.
Must be prefixed with the name of one of the supported database engine types.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
---
@@ -6655,7 +6732,7 @@ public readonly rootRotationStatements: string[];
A list of database statements to be executed to rotate the root user's credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
---
@@ -6669,7 +6746,7 @@ public readonly username: string;
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
---
@@ -6683,7 +6760,7 @@ public readonly usernameTemplate: string;
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
---
@@ -6697,7 +6774,7 @@ public readonly verifyConnection: boolean | IResolvable;
Specifies if the connection is verified during initial configuration.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
---
@@ -6741,7 +6818,7 @@ public readonly name: string;
Name of the database connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name}
---
@@ -6755,7 +6832,7 @@ public readonly allowedRoles: string[];
A list of roles that are allowed to use this connection.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles}
---
@@ -6769,7 +6846,7 @@ public readonly connectionUrl: string;
Connection string to use to connect to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url}
---
@@ -6783,7 +6860,7 @@ public readonly data: {[ key: string ]: string};
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data}
---
@@ -6797,7 +6874,7 @@ public readonly maxConnectionLifetime: number;
Maximum number of seconds a connection may be reused.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime}
---
@@ -6811,7 +6888,7 @@ public readonly maxIdleConnections: number;
Maximum number of idle connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections}
---
@@ -6825,7 +6902,7 @@ public readonly maxOpenConnections: number;
Maximum number of open connections to the database.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections}
---
@@ -6839,7 +6916,7 @@ public readonly password: string;
The root credential password used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password}
---
@@ -6855,7 +6932,7 @@ Specifies the name of the plugin to use for this connection.
Must be prefixed with the name of one of the supported database engine types.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name}
---
@@ -6869,7 +6946,7 @@ public readonly rootRotationStatements: string[];
A list of database statements to be executed to rotate the root user's credentials.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements}
---
@@ -6883,7 +6960,7 @@ public readonly username: string;
The root credential username used in the connection URL.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username}
---
@@ -6897,7 +6974,7 @@ public readonly usernameTemplate: string;
Username generation template.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template}
---
@@ -6911,7 +6988,7 @@ public readonly verifyConnection: boolean | IResolvable;
Specifies if the connection is verified during initial configuration.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection}
---
@@ -7157,6 +7234,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it
| resetPort
| *No description.* |
| resetProtocolVersion
| *No description.* |
| resetRootRotationStatements
| *No description.* |
+| resetSkipVerification
| *No description.* |
| resetTls
| *No description.* |
| resetUsername
| *No description.* |
| resetVerifyConnection
| *No description.* |
@@ -7385,6 +7463,12 @@ public resetProtocolVersion(): void
public resetRootRotationStatements(): void
```
+##### `resetSkipVerification`
+
+```typescript
+public resetSkipVerification(): void
+```
+
##### `resetTls`
```typescript
@@ -7423,6 +7507,7 @@ public resetVerifyConnection(): void
| portInput
| number
| *No description.* |
| protocolVersionInput
| number
| *No description.* |
| rootRotationStatementsInput
| string[]
| *No description.* |
+| skipVerificationInput
| boolean \| cdktf.IResolvable
| *No description.* |
| tlsInput
| boolean \| cdktf.IResolvable
| *No description.* |
| usernameInput
| string
| *No description.* |
| verifyConnectionInput
| boolean \| cdktf.IResolvable
| *No description.* |
@@ -7439,6 +7524,7 @@ public resetVerifyConnection(): void
| port
| number
| *No description.* |
| protocolVersion
| number
| *No description.* |
| rootRotationStatements
| string[]
| *No description.* |
+| skipVerification
| boolean \| cdktf.IResolvable
| *No description.* |
| tls
| boolean \| cdktf.IResolvable
| *No description.* |
| username
| string
| *No description.* |
| verifyConnection
| boolean \| cdktf.IResolvable
| *No description.* |
@@ -7600,6 +7686,16 @@ public readonly rootRotationStatementsInput: string[];
---
+##### `skipVerificationInput`Optional
+
+```typescript
+public readonly skipVerificationInput: boolean | IResolvable;
+```
+
+- *Type:* boolean | cdktf.IResolvable
+
+---
+
##### `tlsInput`Optional
```typescript
@@ -7760,6 +7856,16 @@ public readonly rootRotationStatements: string[];
---
+##### `skipVerification`Required
+
+```typescript
+public readonly skipVerification: boolean | IResolvable;
+```
+
+- *Type:* boolean | cdktf.IResolvable
+
+---
+
##### `tls`Required
```typescript
@@ -18186,8 +18292,12 @@ whether the list is wrapping a set (will add tolist() to be able to access an it
| resetMaxOpenConnections
| *No description.* |
| resetPassword
| *No description.* |
| resetPluginName
| *No description.* |
+| resetPrivateKey
| *No description.* |
| resetRootRotationStatements
| *No description.* |
+| resetSelfManaged
| *No description.* |
| resetServiceAccountJson
| *No description.* |
+| resetTlsCa
| *No description.* |
+| resetTlsCertificate
| *No description.* |
| resetUsername
| *No description.* |
| resetUsernameTemplate
| *No description.* |
| resetVerifyConnection
| *No description.* |
@@ -18404,18 +18514,42 @@ public resetPassword(): void
public resetPluginName(): void
```
+##### `resetPrivateKey`
+
+```typescript
+public resetPrivateKey(): void
+```
+
##### `resetRootRotationStatements`
```typescript
public resetRootRotationStatements(): void
```
+##### `resetSelfManaged`
+
+```typescript
+public resetSelfManaged(): void
+```
+
##### `resetServiceAccountJson`
```typescript
public resetServiceAccountJson(): void
```
+##### `resetTlsCa`
+
+```typescript
+public resetTlsCa(): void
+```
+
+##### `resetTlsCertificate`
+
+```typescript
+public resetTlsCertificate(): void
+```
+
##### `resetUsername`
```typescript
@@ -18452,8 +18586,12 @@ public resetVerifyConnection(): void
| nameInput
| string
| *No description.* |
| passwordInput
| string
| *No description.* |
| pluginNameInput
| string
| *No description.* |
+| privateKeyInput
| string
| *No description.* |
| rootRotationStatementsInput
| string[]
| *No description.* |
+| selfManagedInput
| boolean \| cdktf.IResolvable
| *No description.* |
| serviceAccountJsonInput
| string
| *No description.* |
+| tlsCaInput
| string
| *No description.* |
+| tlsCertificateInput
| string
| *No description.* |
| usernameInput
| string
| *No description.* |
| usernameTemplateInput
| string
| *No description.* |
| verifyConnectionInput
| boolean \| cdktf.IResolvable
| *No description.* |
@@ -18468,8 +18606,12 @@ public resetVerifyConnection(): void
| name
| string
| *No description.* |
| password
| string
| *No description.* |
| pluginName
| string
| *No description.* |
+| privateKey
| string
| *No description.* |
| rootRotationStatements
| string[]
| *No description.* |
+| selfManaged
| boolean \| cdktf.IResolvable
| *No description.* |
| serviceAccountJson
| string
| *No description.* |
+| tlsCa
| string
| *No description.* |
+| tlsCertificate
| string
| *No description.* |
| username
| string
| *No description.* |
| usernameTemplate
| string
| *No description.* |
| verifyConnection
| boolean \| cdktf.IResolvable
| *No description.* |
@@ -18611,6 +18753,16 @@ public readonly pluginNameInput: string;
---
+##### `privateKeyInput`Optional
+
+```typescript
+public readonly privateKeyInput: string;
+```
+
+- *Type:* string
+
+---
+
##### `rootRotationStatementsInput`Optional
```typescript
@@ -18621,6 +18773,16 @@ public readonly rootRotationStatementsInput: string[];
---
+##### `selfManagedInput`Optional
+
+```typescript
+public readonly selfManagedInput: boolean | IResolvable;
+```
+
+- *Type:* boolean | cdktf.IResolvable
+
+---
+
##### `serviceAccountJsonInput`Optional
```typescript
@@ -18631,6 +18793,26 @@ public readonly serviceAccountJsonInput: string;
---
+##### `tlsCaInput`Optional
+
+```typescript
+public readonly tlsCaInput: string;
+```
+
+- *Type:* string
+
+---
+
+##### `tlsCertificateInput`Optional
+
+```typescript
+public readonly tlsCertificateInput: string;
+```
+
+- *Type:* string
+
+---
+
##### `usernameInput`Optional
```typescript
@@ -18771,6 +18953,16 @@ public readonly pluginName: string;
---
+##### `privateKey`Required
+
+```typescript
+public readonly privateKey: string;
+```
+
+- *Type:* string
+
+---
+
##### `rootRotationStatements`Required
```typescript
@@ -18781,6 +18973,16 @@ public readonly rootRotationStatements: string[];
---
+##### `selfManaged`Required
+
+```typescript
+public readonly selfManaged: boolean | IResolvable;
+```
+
+- *Type:* boolean | cdktf.IResolvable
+
+---
+
##### `serviceAccountJson`Required
```typescript
@@ -18791,6 +18993,26 @@ public readonly serviceAccountJson: string;
---
+##### `tlsCa`Required
+
+```typescript
+public readonly tlsCa: string;
+```
+
+- *Type:* string
+
+---
+
+##### `tlsCertificate`Required
+
+```typescript
+public readonly tlsCertificate: string;
+```
+
+- *Type:* string
+
+---
+
##### `username`Required
```typescript
diff --git a/docs/egpPolicy.csharp.md b/docs/egpPolicy.csharp.md
index 5894884a..124dd3c9 100644
--- a/docs/egpPolicy.csharp.md
+++ b/docs/egpPolicy.csharp.md
@@ -4,7 +4,7 @@
### EgpPolicy
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy vault_egp_policy}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy vault_egp_policy}.
#### Initializers
@@ -481,7 +481,7 @@ The construct id used in the generated config for the EgpPolicy to import.
The id of the existing EgpPolicy that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#import import section} in the documentation of this resource for the id to use
---
@@ -847,7 +847,7 @@ new EgpPolicyConfig {
| Name
| string
| Name of the policy. |
| Paths
| string[]
| List of paths to which the policy will be applied. |
| Policy
| string
| The policy document. |
-| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#id EgpPolicy#id}. |
+| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#id EgpPolicy#id}. |
| Namespace
| string
| Target namespace. (requires Enterprise). |
---
@@ -932,7 +932,7 @@ public string EnforcementLevel { get; set; }
Enforcement level of Sentinel policy. Can be one of: 'advisory', 'soft-mandatory' or 'hard-mandatory'.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#enforcement_level EgpPolicy#enforcement_level}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#enforcement_level EgpPolicy#enforcement_level}
---
@@ -946,7 +946,7 @@ public string Name { get; set; }
Name of the policy.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#name EgpPolicy#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#name EgpPolicy#name}
---
@@ -960,7 +960,7 @@ public string[] Paths { get; set; }
List of paths to which the policy will be applied.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#paths EgpPolicy#paths}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#paths EgpPolicy#paths}
---
@@ -974,7 +974,7 @@ public string Policy { get; set; }
The policy document.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#policy EgpPolicy#policy}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#policy EgpPolicy#policy}
---
@@ -986,7 +986,7 @@ public string Id { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#id EgpPolicy#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#id EgpPolicy#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1003,7 +1003,7 @@ public string Namespace { get; set; }
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#namespace EgpPolicy#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#namespace EgpPolicy#namespace}
---
diff --git a/docs/egpPolicy.go.md b/docs/egpPolicy.go.md
index 885d45e0..efc82be3 100644
--- a/docs/egpPolicy.go.md
+++ b/docs/egpPolicy.go.md
@@ -4,7 +4,7 @@
### EgpPolicy
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy vault_egp_policy}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy vault_egp_policy}.
#### Initializers
@@ -481,7 +481,7 @@ The construct id used in the generated config for the EgpPolicy to import.
The id of the existing EgpPolicy that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#import import section} in the documentation of this resource for the id to use
---
@@ -847,7 +847,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/egppolicy"
| Name
| *string
| Name of the policy. |
| Paths
| *[]*string
| List of paths to which the policy will be applied. |
| Policy
| *string
| The policy document. |
-| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#id EgpPolicy#id}. |
+| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#id EgpPolicy#id}. |
| Namespace
| *string
| Target namespace. (requires Enterprise). |
---
@@ -932,7 +932,7 @@ EnforcementLevel *string
Enforcement level of Sentinel policy. Can be one of: 'advisory', 'soft-mandatory' or 'hard-mandatory'.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#enforcement_level EgpPolicy#enforcement_level}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#enforcement_level EgpPolicy#enforcement_level}
---
@@ -946,7 +946,7 @@ Name *string
Name of the policy.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#name EgpPolicy#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#name EgpPolicy#name}
---
@@ -960,7 +960,7 @@ Paths *[]*string
List of paths to which the policy will be applied.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#paths EgpPolicy#paths}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#paths EgpPolicy#paths}
---
@@ -974,7 +974,7 @@ Policy *string
The policy document.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#policy EgpPolicy#policy}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#policy EgpPolicy#policy}
---
@@ -986,7 +986,7 @@ Id *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#id EgpPolicy#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#id EgpPolicy#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1003,7 +1003,7 @@ Namespace *string
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#namespace EgpPolicy#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#namespace EgpPolicy#namespace}
---
diff --git a/docs/egpPolicy.java.md b/docs/egpPolicy.java.md
index a10c98df..a7329c66 100644
--- a/docs/egpPolicy.java.md
+++ b/docs/egpPolicy.java.md
@@ -4,7 +4,7 @@
### EgpPolicy
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy vault_egp_policy}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy vault_egp_policy}.
#### Initializers
@@ -47,7 +47,7 @@ EgpPolicy.Builder.create(Construct scope, java.lang.String id)
| name
| java.lang.String
| Name of the policy. |
| paths
| java.util.List
| List of paths to which the policy will be applied. |
| policy
| java.lang.String
| The policy document. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#id EgpPolicy#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#id EgpPolicy#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
---
@@ -118,7 +118,7 @@ Must be unique amongst siblings in the same scope
Enforcement level of Sentinel policy. Can be one of: 'advisory', 'soft-mandatory' or 'hard-mandatory'.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#enforcement_level EgpPolicy#enforcement_level}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#enforcement_level EgpPolicy#enforcement_level}
---
@@ -128,7 +128,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Name of the policy.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#name EgpPolicy#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#name EgpPolicy#name}
---
@@ -138,7 +138,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
List of paths to which the policy will be applied.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#paths EgpPolicy#paths}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#paths EgpPolicy#paths}
---
@@ -148,7 +148,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The policy document.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#policy EgpPolicy#policy}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#policy EgpPolicy#policy}
---
@@ -156,7 +156,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#id EgpPolicy#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#id EgpPolicy#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -169,7 +169,7 @@ If you experience problems setting this value it might not be settable. Please t
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#namespace EgpPolicy#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#namespace EgpPolicy#namespace}
---
@@ -610,7 +610,7 @@ The construct id used in the generated config for the EgpPolicy to import.
The id of the existing EgpPolicy that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#import import section} in the documentation of this resource for the id to use
---
@@ -980,7 +980,7 @@ EgpPolicyConfig.builder()
| name
| java.lang.String
| Name of the policy. |
| paths
| java.util.List
| List of paths to which the policy will be applied. |
| policy
| java.lang.String
| The policy document. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#id EgpPolicy#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#id EgpPolicy#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
---
@@ -1065,7 +1065,7 @@ public java.lang.String getEnforcementLevel();
Enforcement level of Sentinel policy. Can be one of: 'advisory', 'soft-mandatory' or 'hard-mandatory'.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#enforcement_level EgpPolicy#enforcement_level}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#enforcement_level EgpPolicy#enforcement_level}
---
@@ -1079,7 +1079,7 @@ public java.lang.String getName();
Name of the policy.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#name EgpPolicy#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#name EgpPolicy#name}
---
@@ -1093,7 +1093,7 @@ public java.util.List getPaths();
List of paths to which the policy will be applied.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#paths EgpPolicy#paths}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#paths EgpPolicy#paths}
---
@@ -1107,7 +1107,7 @@ public java.lang.String getPolicy();
The policy document.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#policy EgpPolicy#policy}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#policy EgpPolicy#policy}
---
@@ -1119,7 +1119,7 @@ public java.lang.String getId();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#id EgpPolicy#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#id EgpPolicy#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1136,7 +1136,7 @@ public java.lang.String getNamespace();
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#namespace EgpPolicy#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#namespace EgpPolicy#namespace}
---
diff --git a/docs/egpPolicy.python.md b/docs/egpPolicy.python.md
index 4d00965e..00484fea 100644
--- a/docs/egpPolicy.python.md
+++ b/docs/egpPolicy.python.md
@@ -4,7 +4,7 @@
### EgpPolicy
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy vault_egp_policy}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy vault_egp_policy}.
#### Initializers
@@ -45,7 +45,7 @@ egpPolicy.EgpPolicy(
| name
| str
| Name of the policy. |
| paths
| typing.List[str]
| List of paths to which the policy will be applied. |
| policy
| str
| The policy document. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#id EgpPolicy#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#id EgpPolicy#id}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
---
@@ -116,7 +116,7 @@ Must be unique amongst siblings in the same scope
Enforcement level of Sentinel policy. Can be one of: 'advisory', 'soft-mandatory' or 'hard-mandatory'.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#enforcement_level EgpPolicy#enforcement_level}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#enforcement_level EgpPolicy#enforcement_level}
---
@@ -126,7 +126,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Name of the policy.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#name EgpPolicy#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#name EgpPolicy#name}
---
@@ -136,7 +136,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
List of paths to which the policy will be applied.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#paths EgpPolicy#paths}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#paths EgpPolicy#paths}
---
@@ -146,7 +146,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The policy document.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#policy EgpPolicy#policy}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#policy EgpPolicy#policy}
---
@@ -154,7 +154,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#id EgpPolicy#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#id EgpPolicy#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -167,7 +167,7 @@ If you experience problems setting this value it might not be settable. Please t
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#namespace EgpPolicy#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#namespace EgpPolicy#namespace}
---
@@ -654,7 +654,7 @@ The construct id used in the generated config for the EgpPolicy to import.
The id of the existing EgpPolicy that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#import import section} in the documentation of this resource for the id to use
---
@@ -1020,7 +1020,7 @@ egpPolicy.EgpPolicyConfig(
| name
| str
| Name of the policy. |
| paths
| typing.List[str]
| List of paths to which the policy will be applied. |
| policy
| str
| The policy document. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#id EgpPolicy#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#id EgpPolicy#id}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
---
@@ -1105,7 +1105,7 @@ enforcement_level: str
Enforcement level of Sentinel policy. Can be one of: 'advisory', 'soft-mandatory' or 'hard-mandatory'.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#enforcement_level EgpPolicy#enforcement_level}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#enforcement_level EgpPolicy#enforcement_level}
---
@@ -1119,7 +1119,7 @@ name: str
Name of the policy.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#name EgpPolicy#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#name EgpPolicy#name}
---
@@ -1133,7 +1133,7 @@ paths: typing.List[str]
List of paths to which the policy will be applied.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#paths EgpPolicy#paths}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#paths EgpPolicy#paths}
---
@@ -1147,7 +1147,7 @@ policy: str
The policy document.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#policy EgpPolicy#policy}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#policy EgpPolicy#policy}
---
@@ -1159,7 +1159,7 @@ id: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#id EgpPolicy#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#id EgpPolicy#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1176,7 +1176,7 @@ namespace: str
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#namespace EgpPolicy#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#namespace EgpPolicy#namespace}
---
diff --git a/docs/egpPolicy.typescript.md b/docs/egpPolicy.typescript.md
index c1879217..a1ff1aa4 100644
--- a/docs/egpPolicy.typescript.md
+++ b/docs/egpPolicy.typescript.md
@@ -4,7 +4,7 @@
### EgpPolicy
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy vault_egp_policy}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy vault_egp_policy}.
#### Initializers
@@ -481,7 +481,7 @@ The construct id used in the generated config for the EgpPolicy to import.
The id of the existing EgpPolicy that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#import import section} in the documentation of this resource for the id to use
---
@@ -833,7 +833,7 @@ const egpPolicyConfig: egpPolicy.EgpPolicyConfig = { ... }
| name
| string
| Name of the policy. |
| paths
| string[]
| List of paths to which the policy will be applied. |
| policy
| string
| The policy document. |
-| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#id EgpPolicy#id}. |
+| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#id EgpPolicy#id}. |
| namespace
| string
| Target namespace. (requires Enterprise). |
---
@@ -918,7 +918,7 @@ public readonly enforcementLevel: string;
Enforcement level of Sentinel policy. Can be one of: 'advisory', 'soft-mandatory' or 'hard-mandatory'.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#enforcement_level EgpPolicy#enforcement_level}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#enforcement_level EgpPolicy#enforcement_level}
---
@@ -932,7 +932,7 @@ public readonly name: string;
Name of the policy.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#name EgpPolicy#name}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#name EgpPolicy#name}
---
@@ -946,7 +946,7 @@ public readonly paths: string[];
List of paths to which the policy will be applied.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#paths EgpPolicy#paths}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#paths EgpPolicy#paths}
---
@@ -960,7 +960,7 @@ public readonly policy: string;
The policy document.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#policy EgpPolicy#policy}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#policy EgpPolicy#policy}
---
@@ -972,7 +972,7 @@ public readonly id: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#id EgpPolicy#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#id EgpPolicy#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -989,7 +989,7 @@ public readonly namespace: string;
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#namespace EgpPolicy#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#namespace EgpPolicy#namespace}
---
diff --git a/docs/gcpAuthBackend.csharp.md b/docs/gcpAuthBackend.csharp.md
index aaf2d9bf..b4f83b0f 100644
--- a/docs/gcpAuthBackend.csharp.md
+++ b/docs/gcpAuthBackend.csharp.md
@@ -4,7 +4,7 @@
### GcpAuthBackend
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend vault_gcp_auth_backend}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend vault_gcp_auth_backend}.
#### Initializers
@@ -612,7 +612,7 @@ The construct id used in the generated config for the GcpAuthBackend to import.
The id of the existing GcpAuthBackend that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#import import section} in the documentation of this resource for the id to use
---
@@ -1238,23 +1238,23 @@ new GcpAuthBackendConfig {
| Lifecycle
| HashiCorp.Cdktf.TerraformResourceLifecycle
| *No description.* |
| Provider
| HashiCorp.Cdktf.TerraformProvider
| *No description.* |
| Provisioners
| object[]
| *No description.* |
-| ClientEmail
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#client_email GcpAuthBackend#client_email}. |
-| ClientId
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#client_id GcpAuthBackend#client_id}. |
-| Credentials
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#credentials GcpAuthBackend#credentials}. |
+| ClientEmail
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#client_email GcpAuthBackend#client_email}. |
+| ClientId
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#client_id GcpAuthBackend#client_id}. |
+| Credentials
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#credentials GcpAuthBackend#credentials}. |
| CustomEndpoint
| GcpAuthBackendCustomEndpoint
| custom_endpoint block. |
-| Description
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#description GcpAuthBackend#description}. |
+| Description
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#description GcpAuthBackend#description}. |
| DisableRemount
| object
| If set, opts out of mount migration on path updates. |
-| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#id GcpAuthBackend#id}. |
+| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#id GcpAuthBackend#id}. |
| IdentityTokenAudience
| string
| The audience claim value for plugin identity tokens. |
| IdentityTokenKey
| string
| The key to use for signing identity tokens. |
| IdentityTokenTtl
| double
| The TTL of generated tokens. |
| Local
| object
| Specifies if the auth method is local only. |
| Namespace
| string
| Target namespace. (requires Enterprise). |
-| Path
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#path GcpAuthBackend#path}. |
-| PrivateKeyId
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#private_key_id GcpAuthBackend#private_key_id}. |
-| ProjectId
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#project_id GcpAuthBackend#project_id}. |
+| Path
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#path GcpAuthBackend#path}. |
+| PrivateKeyId
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#private_key_id GcpAuthBackend#private_key_id}. |
+| ProjectId
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#project_id GcpAuthBackend#project_id}. |
| ServiceAccountEmail
| string
| Service Account to impersonate for plugin workload identity federation. |
-| Tune
| object
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#tune GcpAuthBackend#tune}. |
+| Tune
| object
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#tune GcpAuthBackend#tune}. |
---
@@ -1336,7 +1336,7 @@ public string ClientEmail { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#client_email GcpAuthBackend#client_email}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#client_email GcpAuthBackend#client_email}.
---
@@ -1348,7 +1348,7 @@ public string ClientId { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#client_id GcpAuthBackend#client_id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#client_id GcpAuthBackend#client_id}.
---
@@ -1360,7 +1360,7 @@ public string Credentials { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#credentials GcpAuthBackend#credentials}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#credentials GcpAuthBackend#credentials}.
---
@@ -1374,7 +1374,7 @@ public GcpAuthBackendCustomEndpoint CustomEndpoint { get; set; }
custom_endpoint block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#custom_endpoint GcpAuthBackend#custom_endpoint}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#custom_endpoint GcpAuthBackend#custom_endpoint}
---
@@ -1386,7 +1386,7 @@ public string Description { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#description GcpAuthBackend#description}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#description GcpAuthBackend#description}.
---
@@ -1400,7 +1400,7 @@ public object DisableRemount { get; set; }
If set, opts out of mount migration on path updates.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#disable_remount GcpAuthBackend#disable_remount}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#disable_remount GcpAuthBackend#disable_remount}
---
@@ -1412,7 +1412,7 @@ public string Id { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#id GcpAuthBackend#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#id GcpAuthBackend#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1429,7 +1429,7 @@ public string IdentityTokenAudience { get; set; }
The audience claim value for plugin identity tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#identity_token_audience GcpAuthBackend#identity_token_audience}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#identity_token_audience GcpAuthBackend#identity_token_audience}
---
@@ -1443,7 +1443,7 @@ public string IdentityTokenKey { get; set; }
The key to use for signing identity tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#identity_token_key GcpAuthBackend#identity_token_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#identity_token_key GcpAuthBackend#identity_token_key}
---
@@ -1457,7 +1457,7 @@ public double IdentityTokenTtl { get; set; }
The TTL of generated tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#identity_token_ttl GcpAuthBackend#identity_token_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#identity_token_ttl GcpAuthBackend#identity_token_ttl}
---
@@ -1471,7 +1471,7 @@ public object Local { get; set; }
Specifies if the auth method is local only.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#local GcpAuthBackend#local}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#local GcpAuthBackend#local}
---
@@ -1485,7 +1485,7 @@ public string Namespace { get; set; }
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#namespace GcpAuthBackend#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#namespace GcpAuthBackend#namespace}
---
@@ -1497,7 +1497,7 @@ public string Path { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#path GcpAuthBackend#path}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#path GcpAuthBackend#path}.
---
@@ -1509,7 +1509,7 @@ public string PrivateKeyId { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#private_key_id GcpAuthBackend#private_key_id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#private_key_id GcpAuthBackend#private_key_id}.
---
@@ -1521,7 +1521,7 @@ public string ProjectId { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#project_id GcpAuthBackend#project_id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#project_id GcpAuthBackend#project_id}.
---
@@ -1535,7 +1535,7 @@ public string ServiceAccountEmail { get; set; }
Service Account to impersonate for plugin workload identity federation.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#service_account_email GcpAuthBackend#service_account_email}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#service_account_email GcpAuthBackend#service_account_email}
---
@@ -1547,7 +1547,7 @@ public object Tune { get; set; }
- *Type:* object
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#tune GcpAuthBackend#tune}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#tune GcpAuthBackend#tune}.
---
@@ -1587,7 +1587,7 @@ public string Api { get; set; }
Replaces the service endpoint used in API requests to https://www.googleapis.com.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#api GcpAuthBackend#api}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#api GcpAuthBackend#api}
---
@@ -1601,7 +1601,7 @@ public string Compute { get; set; }
Replaces the service endpoint used in API requests to `https://compute.googleapis.com`.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#compute GcpAuthBackend#compute}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#compute GcpAuthBackend#compute}
---
@@ -1615,7 +1615,7 @@ public string Crm { get; set; }
Replaces the service endpoint used in API requests to `https://cloudresourcemanager.googleapis.com`.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#crm GcpAuthBackend#crm}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#crm GcpAuthBackend#crm}
---
@@ -1629,7 +1629,7 @@ public string Iam { get; set; }
Replaces the service endpoint used in API requests to `https://iam.googleapis.com`.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#iam GcpAuthBackend#iam}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#iam GcpAuthBackend#iam}
---
@@ -1656,14 +1656,14 @@ new GcpAuthBackendTune {
| **Name** | **Type** | **Description** |
| --- | --- | --- |
-| AllowedResponseHeaders
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#allowed_response_headers GcpAuthBackend#allowed_response_headers}. |
-| AuditNonHmacRequestKeys
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#audit_non_hmac_request_keys GcpAuthBackend#audit_non_hmac_request_keys}. |
-| AuditNonHmacResponseKeys
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#audit_non_hmac_response_keys GcpAuthBackend#audit_non_hmac_response_keys}. |
-| DefaultLeaseTtl
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#default_lease_ttl GcpAuthBackend#default_lease_ttl}. |
-| ListingVisibility
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#listing_visibility GcpAuthBackend#listing_visibility}. |
-| MaxLeaseTtl
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#max_lease_ttl GcpAuthBackend#max_lease_ttl}. |
-| PassthroughRequestHeaders
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#passthrough_request_headers GcpAuthBackend#passthrough_request_headers}. |
-| TokenType
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#token_type GcpAuthBackend#token_type}. |
+| AllowedResponseHeaders
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#allowed_response_headers GcpAuthBackend#allowed_response_headers}. |
+| AuditNonHmacRequestKeys
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#audit_non_hmac_request_keys GcpAuthBackend#audit_non_hmac_request_keys}. |
+| AuditNonHmacResponseKeys
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#audit_non_hmac_response_keys GcpAuthBackend#audit_non_hmac_response_keys}. |
+| DefaultLeaseTtl
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#default_lease_ttl GcpAuthBackend#default_lease_ttl}. |
+| ListingVisibility
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#listing_visibility GcpAuthBackend#listing_visibility}. |
+| MaxLeaseTtl
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#max_lease_ttl GcpAuthBackend#max_lease_ttl}. |
+| PassthroughRequestHeaders
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#passthrough_request_headers GcpAuthBackend#passthrough_request_headers}. |
+| TokenType
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#token_type GcpAuthBackend#token_type}. |
---
@@ -1675,7 +1675,7 @@ public string[] AllowedResponseHeaders { get; set; }
- *Type:* string[]
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#allowed_response_headers GcpAuthBackend#allowed_response_headers}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#allowed_response_headers GcpAuthBackend#allowed_response_headers}.
---
@@ -1687,7 +1687,7 @@ public string[] AuditNonHmacRequestKeys { get; set; }
- *Type:* string[]
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#audit_non_hmac_request_keys GcpAuthBackend#audit_non_hmac_request_keys}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#audit_non_hmac_request_keys GcpAuthBackend#audit_non_hmac_request_keys}.
---
@@ -1699,7 +1699,7 @@ public string[] AuditNonHmacResponseKeys { get; set; }
- *Type:* string[]
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#audit_non_hmac_response_keys GcpAuthBackend#audit_non_hmac_response_keys}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#audit_non_hmac_response_keys GcpAuthBackend#audit_non_hmac_response_keys}.
---
@@ -1711,7 +1711,7 @@ public string DefaultLeaseTtl { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#default_lease_ttl GcpAuthBackend#default_lease_ttl}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#default_lease_ttl GcpAuthBackend#default_lease_ttl}.
---
@@ -1723,7 +1723,7 @@ public string ListingVisibility { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#listing_visibility GcpAuthBackend#listing_visibility}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#listing_visibility GcpAuthBackend#listing_visibility}.
---
@@ -1735,7 +1735,7 @@ public string MaxLeaseTtl { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#max_lease_ttl GcpAuthBackend#max_lease_ttl}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#max_lease_ttl GcpAuthBackend#max_lease_ttl}.
---
@@ -1747,7 +1747,7 @@ public string[] PassthroughRequestHeaders { get; set; }
- *Type:* string[]
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#passthrough_request_headers GcpAuthBackend#passthrough_request_headers}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#passthrough_request_headers GcpAuthBackend#passthrough_request_headers}.
---
@@ -1759,7 +1759,7 @@ public string TokenType { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#token_type GcpAuthBackend#token_type}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#token_type GcpAuthBackend#token_type}.
---
diff --git a/docs/gcpAuthBackend.go.md b/docs/gcpAuthBackend.go.md
index 45a59518..34279faf 100644
--- a/docs/gcpAuthBackend.go.md
+++ b/docs/gcpAuthBackend.go.md
@@ -4,7 +4,7 @@
### GcpAuthBackend
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend vault_gcp_auth_backend}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend vault_gcp_auth_backend}.
#### Initializers
@@ -612,7 +612,7 @@ The construct id used in the generated config for the GcpAuthBackend to import.
The id of the existing GcpAuthBackend that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#import import section} in the documentation of this resource for the id to use
---
@@ -1238,23 +1238,23 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/gcpauthbackend"
| Lifecycle
| github.com/hashicorp/terraform-cdk-go/cdktf.TerraformResourceLifecycle
| *No description.* |
| Provider
| github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProvider
| *No description.* |
| Provisioners
| *[]interface{}
| *No description.* |
-| ClientEmail
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#client_email GcpAuthBackend#client_email}. |
-| ClientId
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#client_id GcpAuthBackend#client_id}. |
-| Credentials
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#credentials GcpAuthBackend#credentials}. |
+| ClientEmail
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#client_email GcpAuthBackend#client_email}. |
+| ClientId
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#client_id GcpAuthBackend#client_id}. |
+| Credentials
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#credentials GcpAuthBackend#credentials}. |
| CustomEndpoint
| GcpAuthBackendCustomEndpoint
| custom_endpoint block. |
-| Description
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#description GcpAuthBackend#description}. |
+| Description
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#description GcpAuthBackend#description}. |
| DisableRemount
| interface{}
| If set, opts out of mount migration on path updates. |
-| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#id GcpAuthBackend#id}. |
+| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#id GcpAuthBackend#id}. |
| IdentityTokenAudience
| *string
| The audience claim value for plugin identity tokens. |
| IdentityTokenKey
| *string
| The key to use for signing identity tokens. |
| IdentityTokenTtl
| *f64
| The TTL of generated tokens. |
| Local
| interface{}
| Specifies if the auth method is local only. |
| Namespace
| *string
| Target namespace. (requires Enterprise). |
-| Path
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#path GcpAuthBackend#path}. |
-| PrivateKeyId
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#private_key_id GcpAuthBackend#private_key_id}. |
-| ProjectId
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#project_id GcpAuthBackend#project_id}. |
+| Path
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#path GcpAuthBackend#path}. |
+| PrivateKeyId
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#private_key_id GcpAuthBackend#private_key_id}. |
+| ProjectId
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#project_id GcpAuthBackend#project_id}. |
| ServiceAccountEmail
| *string
| Service Account to impersonate for plugin workload identity federation. |
-| Tune
| interface{}
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#tune GcpAuthBackend#tune}. |
+| Tune
| interface{}
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#tune GcpAuthBackend#tune}. |
---
@@ -1336,7 +1336,7 @@ ClientEmail *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#client_email GcpAuthBackend#client_email}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#client_email GcpAuthBackend#client_email}.
---
@@ -1348,7 +1348,7 @@ ClientId *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#client_id GcpAuthBackend#client_id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#client_id GcpAuthBackend#client_id}.
---
@@ -1360,7 +1360,7 @@ Credentials *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#credentials GcpAuthBackend#credentials}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#credentials GcpAuthBackend#credentials}.
---
@@ -1374,7 +1374,7 @@ CustomEndpoint GcpAuthBackendCustomEndpoint
custom_endpoint block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#custom_endpoint GcpAuthBackend#custom_endpoint}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#custom_endpoint GcpAuthBackend#custom_endpoint}
---
@@ -1386,7 +1386,7 @@ Description *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#description GcpAuthBackend#description}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#description GcpAuthBackend#description}.
---
@@ -1400,7 +1400,7 @@ DisableRemount interface{}
If set, opts out of mount migration on path updates.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#disable_remount GcpAuthBackend#disable_remount}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#disable_remount GcpAuthBackend#disable_remount}
---
@@ -1412,7 +1412,7 @@ Id *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#id GcpAuthBackend#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#id GcpAuthBackend#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1429,7 +1429,7 @@ IdentityTokenAudience *string
The audience claim value for plugin identity tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#identity_token_audience GcpAuthBackend#identity_token_audience}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#identity_token_audience GcpAuthBackend#identity_token_audience}
---
@@ -1443,7 +1443,7 @@ IdentityTokenKey *string
The key to use for signing identity tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#identity_token_key GcpAuthBackend#identity_token_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#identity_token_key GcpAuthBackend#identity_token_key}
---
@@ -1457,7 +1457,7 @@ IdentityTokenTtl *f64
The TTL of generated tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#identity_token_ttl GcpAuthBackend#identity_token_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#identity_token_ttl GcpAuthBackend#identity_token_ttl}
---
@@ -1471,7 +1471,7 @@ Local interface{}
Specifies if the auth method is local only.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#local GcpAuthBackend#local}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#local GcpAuthBackend#local}
---
@@ -1485,7 +1485,7 @@ Namespace *string
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#namespace GcpAuthBackend#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#namespace GcpAuthBackend#namespace}
---
@@ -1497,7 +1497,7 @@ Path *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#path GcpAuthBackend#path}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#path GcpAuthBackend#path}.
---
@@ -1509,7 +1509,7 @@ PrivateKeyId *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#private_key_id GcpAuthBackend#private_key_id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#private_key_id GcpAuthBackend#private_key_id}.
---
@@ -1521,7 +1521,7 @@ ProjectId *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#project_id GcpAuthBackend#project_id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#project_id GcpAuthBackend#project_id}.
---
@@ -1535,7 +1535,7 @@ ServiceAccountEmail *string
Service Account to impersonate for plugin workload identity federation.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#service_account_email GcpAuthBackend#service_account_email}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#service_account_email GcpAuthBackend#service_account_email}
---
@@ -1547,7 +1547,7 @@ Tune interface{}
- *Type:* interface{}
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#tune GcpAuthBackend#tune}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#tune GcpAuthBackend#tune}.
---
@@ -1587,7 +1587,7 @@ Api *string
Replaces the service endpoint used in API requests to https://www.googleapis.com.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#api GcpAuthBackend#api}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#api GcpAuthBackend#api}
---
@@ -1601,7 +1601,7 @@ Compute *string
Replaces the service endpoint used in API requests to `https://compute.googleapis.com`.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#compute GcpAuthBackend#compute}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#compute GcpAuthBackend#compute}
---
@@ -1615,7 +1615,7 @@ Crm *string
Replaces the service endpoint used in API requests to `https://cloudresourcemanager.googleapis.com`.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#crm GcpAuthBackend#crm}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#crm GcpAuthBackend#crm}
---
@@ -1629,7 +1629,7 @@ Iam *string
Replaces the service endpoint used in API requests to `https://iam.googleapis.com`.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#iam GcpAuthBackend#iam}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#iam GcpAuthBackend#iam}
---
@@ -1656,14 +1656,14 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/gcpauthbackend"
| **Name** | **Type** | **Description** |
| --- | --- | --- |
-| AllowedResponseHeaders
| *[]*string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#allowed_response_headers GcpAuthBackend#allowed_response_headers}. |
-| AuditNonHmacRequestKeys
| *[]*string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#audit_non_hmac_request_keys GcpAuthBackend#audit_non_hmac_request_keys}. |
-| AuditNonHmacResponseKeys
| *[]*string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#audit_non_hmac_response_keys GcpAuthBackend#audit_non_hmac_response_keys}. |
-| DefaultLeaseTtl
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#default_lease_ttl GcpAuthBackend#default_lease_ttl}. |
-| ListingVisibility
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#listing_visibility GcpAuthBackend#listing_visibility}. |
-| MaxLeaseTtl
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#max_lease_ttl GcpAuthBackend#max_lease_ttl}. |
-| PassthroughRequestHeaders
| *[]*string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#passthrough_request_headers GcpAuthBackend#passthrough_request_headers}. |
-| TokenType
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#token_type GcpAuthBackend#token_type}. |
+| AllowedResponseHeaders
| *[]*string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#allowed_response_headers GcpAuthBackend#allowed_response_headers}. |
+| AuditNonHmacRequestKeys
| *[]*string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#audit_non_hmac_request_keys GcpAuthBackend#audit_non_hmac_request_keys}. |
+| AuditNonHmacResponseKeys
| *[]*string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#audit_non_hmac_response_keys GcpAuthBackend#audit_non_hmac_response_keys}. |
+| DefaultLeaseTtl
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#default_lease_ttl GcpAuthBackend#default_lease_ttl}. |
+| ListingVisibility
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#listing_visibility GcpAuthBackend#listing_visibility}. |
+| MaxLeaseTtl
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#max_lease_ttl GcpAuthBackend#max_lease_ttl}. |
+| PassthroughRequestHeaders
| *[]*string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#passthrough_request_headers GcpAuthBackend#passthrough_request_headers}. |
+| TokenType
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#token_type GcpAuthBackend#token_type}. |
---
@@ -1675,7 +1675,7 @@ AllowedResponseHeaders *[]*string
- *Type:* *[]*string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#allowed_response_headers GcpAuthBackend#allowed_response_headers}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#allowed_response_headers GcpAuthBackend#allowed_response_headers}.
---
@@ -1687,7 +1687,7 @@ AuditNonHmacRequestKeys *[]*string
- *Type:* *[]*string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#audit_non_hmac_request_keys GcpAuthBackend#audit_non_hmac_request_keys}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#audit_non_hmac_request_keys GcpAuthBackend#audit_non_hmac_request_keys}.
---
@@ -1699,7 +1699,7 @@ AuditNonHmacResponseKeys *[]*string
- *Type:* *[]*string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#audit_non_hmac_response_keys GcpAuthBackend#audit_non_hmac_response_keys}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#audit_non_hmac_response_keys GcpAuthBackend#audit_non_hmac_response_keys}.
---
@@ -1711,7 +1711,7 @@ DefaultLeaseTtl *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#default_lease_ttl GcpAuthBackend#default_lease_ttl}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#default_lease_ttl GcpAuthBackend#default_lease_ttl}.
---
@@ -1723,7 +1723,7 @@ ListingVisibility *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#listing_visibility GcpAuthBackend#listing_visibility}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#listing_visibility GcpAuthBackend#listing_visibility}.
---
@@ -1735,7 +1735,7 @@ MaxLeaseTtl *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#max_lease_ttl GcpAuthBackend#max_lease_ttl}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#max_lease_ttl GcpAuthBackend#max_lease_ttl}.
---
@@ -1747,7 +1747,7 @@ PassthroughRequestHeaders *[]*string
- *Type:* *[]*string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#passthrough_request_headers GcpAuthBackend#passthrough_request_headers}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#passthrough_request_headers GcpAuthBackend#passthrough_request_headers}.
---
@@ -1759,7 +1759,7 @@ TokenType *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#token_type GcpAuthBackend#token_type}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#token_type GcpAuthBackend#token_type}.
---
diff --git a/docs/gcpAuthBackend.java.md b/docs/gcpAuthBackend.java.md
index 305008f9..e3c2b4d8 100644
--- a/docs/gcpAuthBackend.java.md
+++ b/docs/gcpAuthBackend.java.md
@@ -4,7 +4,7 @@
### GcpAuthBackend
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend vault_gcp_auth_backend}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend vault_gcp_auth_backend}.
#### Initializers
@@ -57,23 +57,23 @@ GcpAuthBackend.Builder.create(Construct scope, java.lang.String id)
| lifecycle
| com.hashicorp.cdktf.TerraformResourceLifecycle
| *No description.* |
| provider
| com.hashicorp.cdktf.TerraformProvider
| *No description.* |
| provisioners
| java.util.List
| *No description.* |
-| clientEmail
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#client_email GcpAuthBackend#client_email}. |
-| clientId
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#client_id GcpAuthBackend#client_id}. |
-| credentials
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#credentials GcpAuthBackend#credentials}. |
+| clientEmail
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#client_email GcpAuthBackend#client_email}. |
+| clientId
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#client_id GcpAuthBackend#client_id}. |
+| credentials
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#credentials GcpAuthBackend#credentials}. |
| customEndpoint
| GcpAuthBackendCustomEndpoint
| custom_endpoint block. |
-| description
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#description GcpAuthBackend#description}. |
+| description
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#description GcpAuthBackend#description}. |
| disableRemount
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| If set, opts out of mount migration on path updates. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#id GcpAuthBackend#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#id GcpAuthBackend#id}. |
| identityTokenAudience
| java.lang.String
| The audience claim value for plugin identity tokens. |
| identityTokenKey
| java.lang.String
| The key to use for signing identity tokens. |
| identityTokenTtl
| java.lang.Number
| The TTL of generated tokens. |
| local
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| Specifies if the auth method is local only. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
-| path
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#path GcpAuthBackend#path}. |
-| privateKeyId
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#private_key_id GcpAuthBackend#private_key_id}. |
-| projectId
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#project_id GcpAuthBackend#project_id}. |
+| path
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#path GcpAuthBackend#path}. |
+| privateKeyId
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#private_key_id GcpAuthBackend#private_key_id}. |
+| projectId
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#project_id GcpAuthBackend#project_id}. |
| serviceAccountEmail
| java.lang.String
| Service Account to impersonate for plugin workload identity federation. |
-| tune
| com.hashicorp.cdktf.IResolvable OR java.util.List<GcpAuthBackendTune>
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#tune GcpAuthBackend#tune}. |
+| tune
| com.hashicorp.cdktf.IResolvable OR java.util.List<GcpAuthBackendTune>
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#tune GcpAuthBackend#tune}. |
---
@@ -141,7 +141,7 @@ Must be unique amongst siblings in the same scope
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#client_email GcpAuthBackend#client_email}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#client_email GcpAuthBackend#client_email}.
---
@@ -149,7 +149,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#client_id GcpAuthBackend#client_id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#client_id GcpAuthBackend#client_id}.
---
@@ -157,7 +157,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#credentials GcpAuthBackend#credentials}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#credentials GcpAuthBackend#credentials}.
---
@@ -167,7 +167,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
custom_endpoint block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#custom_endpoint GcpAuthBackend#custom_endpoint}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#custom_endpoint GcpAuthBackend#custom_endpoint}
---
@@ -175,7 +175,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#description GcpAuthBackend#description}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#description GcpAuthBackend#description}.
---
@@ -185,7 +185,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
If set, opts out of mount migration on path updates.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#disable_remount GcpAuthBackend#disable_remount}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#disable_remount GcpAuthBackend#disable_remount}
---
@@ -193,7 +193,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#id GcpAuthBackend#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#id GcpAuthBackend#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -206,7 +206,7 @@ If you experience problems setting this value it might not be settable. Please t
The audience claim value for plugin identity tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#identity_token_audience GcpAuthBackend#identity_token_audience}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#identity_token_audience GcpAuthBackend#identity_token_audience}
---
@@ -216,7 +216,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The key to use for signing identity tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#identity_token_key GcpAuthBackend#identity_token_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#identity_token_key GcpAuthBackend#identity_token_key}
---
@@ -226,7 +226,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The TTL of generated tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#identity_token_ttl GcpAuthBackend#identity_token_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#identity_token_ttl GcpAuthBackend#identity_token_ttl}
---
@@ -236,7 +236,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Specifies if the auth method is local only.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#local GcpAuthBackend#local}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#local GcpAuthBackend#local}
---
@@ -246,7 +246,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#namespace GcpAuthBackend#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#namespace GcpAuthBackend#namespace}
---
@@ -254,7 +254,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#path GcpAuthBackend#path}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#path GcpAuthBackend#path}.
---
@@ -262,7 +262,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#private_key_id GcpAuthBackend#private_key_id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#private_key_id GcpAuthBackend#private_key_id}.
---
@@ -270,7 +270,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#project_id GcpAuthBackend#project_id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#project_id GcpAuthBackend#project_id}.
---
@@ -280,7 +280,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Service Account to impersonate for plugin workload identity federation.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#service_account_email GcpAuthBackend#service_account_email}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#service_account_email GcpAuthBackend#service_account_email}
---
@@ -288,7 +288,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* com.hashicorp.cdktf.IResolvable OR java.util.List<GcpAuthBackendTune>
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#tune GcpAuthBackend#tune}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#tune GcpAuthBackend#tune}.
---
@@ -860,7 +860,7 @@ The construct id used in the generated config for the GcpAuthBackend to import.
The id of the existing GcpAuthBackend that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#import import section} in the documentation of this resource for the id to use
---
@@ -1493,23 +1493,23 @@ GcpAuthBackendConfig.builder()
| lifecycle
| com.hashicorp.cdktf.TerraformResourceLifecycle
| *No description.* |
| provider
| com.hashicorp.cdktf.TerraformProvider
| *No description.* |
| provisioners
| java.util.List
| *No description.* |
-| clientEmail
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#client_email GcpAuthBackend#client_email}. |
-| clientId
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#client_id GcpAuthBackend#client_id}. |
-| credentials
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#credentials GcpAuthBackend#credentials}. |
+| clientEmail
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#client_email GcpAuthBackend#client_email}. |
+| clientId
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#client_id GcpAuthBackend#client_id}. |
+| credentials
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#credentials GcpAuthBackend#credentials}. |
| customEndpoint
| GcpAuthBackendCustomEndpoint
| custom_endpoint block. |
-| description
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#description GcpAuthBackend#description}. |
+| description
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#description GcpAuthBackend#description}. |
| disableRemount
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| If set, opts out of mount migration on path updates. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#id GcpAuthBackend#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#id GcpAuthBackend#id}. |
| identityTokenAudience
| java.lang.String
| The audience claim value for plugin identity tokens. |
| identityTokenKey
| java.lang.String
| The key to use for signing identity tokens. |
| identityTokenTtl
| java.lang.Number
| The TTL of generated tokens. |
| local
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| Specifies if the auth method is local only. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
-| path
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#path GcpAuthBackend#path}. |
-| privateKeyId
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#private_key_id GcpAuthBackend#private_key_id}. |
-| projectId
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#project_id GcpAuthBackend#project_id}. |
+| path
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#path GcpAuthBackend#path}. |
+| privateKeyId
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#private_key_id GcpAuthBackend#private_key_id}. |
+| projectId
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#project_id GcpAuthBackend#project_id}. |
| serviceAccountEmail
| java.lang.String
| Service Account to impersonate for plugin workload identity federation. |
-| tune
| com.hashicorp.cdktf.IResolvable OR java.util.List<GcpAuthBackendTune>
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#tune GcpAuthBackend#tune}. |
+| tune
| com.hashicorp.cdktf.IResolvable OR java.util.List<GcpAuthBackendTune>
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#tune GcpAuthBackend#tune}. |
---
@@ -1591,7 +1591,7 @@ public java.lang.String getClientEmail();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#client_email GcpAuthBackend#client_email}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#client_email GcpAuthBackend#client_email}.
---
@@ -1603,7 +1603,7 @@ public java.lang.String getClientId();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#client_id GcpAuthBackend#client_id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#client_id GcpAuthBackend#client_id}.
---
@@ -1615,7 +1615,7 @@ public java.lang.String getCredentials();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#credentials GcpAuthBackend#credentials}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#credentials GcpAuthBackend#credentials}.
---
@@ -1629,7 +1629,7 @@ public GcpAuthBackendCustomEndpoint getCustomEndpoint();
custom_endpoint block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#custom_endpoint GcpAuthBackend#custom_endpoint}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#custom_endpoint GcpAuthBackend#custom_endpoint}
---
@@ -1641,7 +1641,7 @@ public java.lang.String getDescription();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#description GcpAuthBackend#description}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#description GcpAuthBackend#description}.
---
@@ -1655,7 +1655,7 @@ public java.lang.Object getDisableRemount();
If set, opts out of mount migration on path updates.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#disable_remount GcpAuthBackend#disable_remount}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#disable_remount GcpAuthBackend#disable_remount}
---
@@ -1667,7 +1667,7 @@ public java.lang.String getId();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#id GcpAuthBackend#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#id GcpAuthBackend#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1684,7 +1684,7 @@ public java.lang.String getIdentityTokenAudience();
The audience claim value for plugin identity tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#identity_token_audience GcpAuthBackend#identity_token_audience}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#identity_token_audience GcpAuthBackend#identity_token_audience}
---
@@ -1698,7 +1698,7 @@ public java.lang.String getIdentityTokenKey();
The key to use for signing identity tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#identity_token_key GcpAuthBackend#identity_token_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#identity_token_key GcpAuthBackend#identity_token_key}
---
@@ -1712,7 +1712,7 @@ public java.lang.Number getIdentityTokenTtl();
The TTL of generated tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#identity_token_ttl GcpAuthBackend#identity_token_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#identity_token_ttl GcpAuthBackend#identity_token_ttl}
---
@@ -1726,7 +1726,7 @@ public java.lang.Object getLocal();
Specifies if the auth method is local only.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#local GcpAuthBackend#local}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#local GcpAuthBackend#local}
---
@@ -1740,7 +1740,7 @@ public java.lang.String getNamespace();
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#namespace GcpAuthBackend#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#namespace GcpAuthBackend#namespace}
---
@@ -1752,7 +1752,7 @@ public java.lang.String getPath();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#path GcpAuthBackend#path}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#path GcpAuthBackend#path}.
---
@@ -1764,7 +1764,7 @@ public java.lang.String getPrivateKeyId();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#private_key_id GcpAuthBackend#private_key_id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#private_key_id GcpAuthBackend#private_key_id}.
---
@@ -1776,7 +1776,7 @@ public java.lang.String getProjectId();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#project_id GcpAuthBackend#project_id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#project_id GcpAuthBackend#project_id}.
---
@@ -1790,7 +1790,7 @@ public java.lang.String getServiceAccountEmail();
Service Account to impersonate for plugin workload identity federation.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#service_account_email GcpAuthBackend#service_account_email}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#service_account_email GcpAuthBackend#service_account_email}
---
@@ -1802,7 +1802,7 @@ public java.lang.Object getTune();
- *Type:* com.hashicorp.cdktf.IResolvable OR java.util.List<GcpAuthBackendTune>
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#tune GcpAuthBackend#tune}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#tune GcpAuthBackend#tune}.
---
@@ -1842,7 +1842,7 @@ public java.lang.String getApi();
Replaces the service endpoint used in API requests to https://www.googleapis.com.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#api GcpAuthBackend#api}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#api GcpAuthBackend#api}
---
@@ -1856,7 +1856,7 @@ public java.lang.String getCompute();
Replaces the service endpoint used in API requests to `https://compute.googleapis.com`.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#compute GcpAuthBackend#compute}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#compute GcpAuthBackend#compute}
---
@@ -1870,7 +1870,7 @@ public java.lang.String getCrm();
Replaces the service endpoint used in API requests to `https://cloudresourcemanager.googleapis.com`.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#crm GcpAuthBackend#crm}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#crm GcpAuthBackend#crm}
---
@@ -1884,7 +1884,7 @@ public java.lang.String getIam();
Replaces the service endpoint used in API requests to `https://iam.googleapis.com`.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#iam GcpAuthBackend#iam}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#iam GcpAuthBackend#iam}
---
@@ -1911,14 +1911,14 @@ GcpAuthBackendTune.builder()
| **Name** | **Type** | **Description** |
| --- | --- | --- |
-| allowedResponseHeaders
| java.util.List
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#allowed_response_headers GcpAuthBackend#allowed_response_headers}. |
-| auditNonHmacRequestKeys
| java.util.List
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#audit_non_hmac_request_keys GcpAuthBackend#audit_non_hmac_request_keys}. |
-| auditNonHmacResponseKeys
| java.util.List
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#audit_non_hmac_response_keys GcpAuthBackend#audit_non_hmac_response_keys}. |
-| defaultLeaseTtl
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#default_lease_ttl GcpAuthBackend#default_lease_ttl}. |
-| listingVisibility
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#listing_visibility GcpAuthBackend#listing_visibility}. |
-| maxLeaseTtl
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#max_lease_ttl GcpAuthBackend#max_lease_ttl}. |
-| passthroughRequestHeaders
| java.util.List
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#passthrough_request_headers GcpAuthBackend#passthrough_request_headers}. |
-| tokenType
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#token_type GcpAuthBackend#token_type}. |
+| allowedResponseHeaders
| java.util.List
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#allowed_response_headers GcpAuthBackend#allowed_response_headers}. |
+| auditNonHmacRequestKeys
| java.util.List
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#audit_non_hmac_request_keys GcpAuthBackend#audit_non_hmac_request_keys}. |
+| auditNonHmacResponseKeys
| java.util.List
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#audit_non_hmac_response_keys GcpAuthBackend#audit_non_hmac_response_keys}. |
+| defaultLeaseTtl
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#default_lease_ttl GcpAuthBackend#default_lease_ttl}. |
+| listingVisibility
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#listing_visibility GcpAuthBackend#listing_visibility}. |
+| maxLeaseTtl
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#max_lease_ttl GcpAuthBackend#max_lease_ttl}. |
+| passthroughRequestHeaders
| java.util.List
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#passthrough_request_headers GcpAuthBackend#passthrough_request_headers}. |
+| tokenType
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#token_type GcpAuthBackend#token_type}. |
---
@@ -1930,7 +1930,7 @@ public java.util.List getAllowedResponseHeaders();
- *Type:* java.util.List
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#allowed_response_headers GcpAuthBackend#allowed_response_headers}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#allowed_response_headers GcpAuthBackend#allowed_response_headers}.
---
@@ -1942,7 +1942,7 @@ public java.util.List getAuditNonHmacRequestKeys();
- *Type:* java.util.List
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#audit_non_hmac_request_keys GcpAuthBackend#audit_non_hmac_request_keys}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#audit_non_hmac_request_keys GcpAuthBackend#audit_non_hmac_request_keys}.
---
@@ -1954,7 +1954,7 @@ public java.util.List getAuditNonHmacResponseKeys();
- *Type:* java.util.List
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#audit_non_hmac_response_keys GcpAuthBackend#audit_non_hmac_response_keys}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#audit_non_hmac_response_keys GcpAuthBackend#audit_non_hmac_response_keys}.
---
@@ -1966,7 +1966,7 @@ public java.lang.String getDefaultLeaseTtl();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#default_lease_ttl GcpAuthBackend#default_lease_ttl}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#default_lease_ttl GcpAuthBackend#default_lease_ttl}.
---
@@ -1978,7 +1978,7 @@ public java.lang.String getListingVisibility();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#listing_visibility GcpAuthBackend#listing_visibility}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#listing_visibility GcpAuthBackend#listing_visibility}.
---
@@ -1990,7 +1990,7 @@ public java.lang.String getMaxLeaseTtl();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#max_lease_ttl GcpAuthBackend#max_lease_ttl}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#max_lease_ttl GcpAuthBackend#max_lease_ttl}.
---
@@ -2002,7 +2002,7 @@ public java.util.List getPassthroughRequestHeaders();
- *Type:* java.util.List
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#passthrough_request_headers GcpAuthBackend#passthrough_request_headers}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#passthrough_request_headers GcpAuthBackend#passthrough_request_headers}.
---
@@ -2014,7 +2014,7 @@ public java.lang.String getTokenType();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#token_type GcpAuthBackend#token_type}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#token_type GcpAuthBackend#token_type}.
---
diff --git a/docs/gcpAuthBackend.python.md b/docs/gcpAuthBackend.python.md
index 3811252f..0c424f02 100644
--- a/docs/gcpAuthBackend.python.md
+++ b/docs/gcpAuthBackend.python.md
@@ -4,7 +4,7 @@
### GcpAuthBackend
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend vault_gcp_auth_backend}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend vault_gcp_auth_backend}.
#### Initializers
@@ -52,23 +52,23 @@ gcpAuthBackend.GcpAuthBackend(
| lifecycle
| cdktf.TerraformResourceLifecycle
| *No description.* |
| provider
| cdktf.TerraformProvider
| *No description.* |
| provisioners
| typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]]
| *No description.* |
-| client_email
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#client_email GcpAuthBackend#client_email}. |
-| client_id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#client_id GcpAuthBackend#client_id}. |
-| credentials
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#credentials GcpAuthBackend#credentials}. |
+| client_email
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#client_email GcpAuthBackend#client_email}. |
+| client_id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#client_id GcpAuthBackend#client_id}. |
+| credentials
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#credentials GcpAuthBackend#credentials}. |
| custom_endpoint
| GcpAuthBackendCustomEndpoint
| custom_endpoint block. |
-| description
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#description GcpAuthBackend#description}. |
+| description
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#description GcpAuthBackend#description}. |
| disable_remount
| typing.Union[bool, cdktf.IResolvable]
| If set, opts out of mount migration on path updates. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#id GcpAuthBackend#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#id GcpAuthBackend#id}. |
| identity_token_audience
| str
| The audience claim value for plugin identity tokens. |
| identity_token_key
| str
| The key to use for signing identity tokens. |
| identity_token_ttl
| typing.Union[int, float]
| The TTL of generated tokens. |
| local
| typing.Union[bool, cdktf.IResolvable]
| Specifies if the auth method is local only. |
| namespace
| str
| Target namespace. (requires Enterprise). |
-| path
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#path GcpAuthBackend#path}. |
-| private_key_id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#private_key_id GcpAuthBackend#private_key_id}. |
-| project_id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#project_id GcpAuthBackend#project_id}. |
+| path
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#path GcpAuthBackend#path}. |
+| private_key_id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#private_key_id GcpAuthBackend#private_key_id}. |
+| project_id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#project_id GcpAuthBackend#project_id}. |
| service_account_email
| str
| Service Account to impersonate for plugin workload identity federation. |
-| tune
| typing.Union[cdktf.IResolvable, typing.List[GcpAuthBackendTune]]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#tune GcpAuthBackend#tune}. |
+| tune
| typing.Union[cdktf.IResolvable, typing.List[GcpAuthBackendTune]]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#tune GcpAuthBackend#tune}. |
---
@@ -136,7 +136,7 @@ Must be unique amongst siblings in the same scope
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#client_email GcpAuthBackend#client_email}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#client_email GcpAuthBackend#client_email}.
---
@@ -144,7 +144,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#client_id GcpAuthBackend#client_id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#client_id GcpAuthBackend#client_id}.
---
@@ -152,7 +152,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#credentials GcpAuthBackend#credentials}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#credentials GcpAuthBackend#credentials}.
---
@@ -162,7 +162,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
custom_endpoint block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#custom_endpoint GcpAuthBackend#custom_endpoint}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#custom_endpoint GcpAuthBackend#custom_endpoint}
---
@@ -170,7 +170,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#description GcpAuthBackend#description}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#description GcpAuthBackend#description}.
---
@@ -180,7 +180,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
If set, opts out of mount migration on path updates.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#disable_remount GcpAuthBackend#disable_remount}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#disable_remount GcpAuthBackend#disable_remount}
---
@@ -188,7 +188,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#id GcpAuthBackend#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#id GcpAuthBackend#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -201,7 +201,7 @@ If you experience problems setting this value it might not be settable. Please t
The audience claim value for plugin identity tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#identity_token_audience GcpAuthBackend#identity_token_audience}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#identity_token_audience GcpAuthBackend#identity_token_audience}
---
@@ -211,7 +211,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The key to use for signing identity tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#identity_token_key GcpAuthBackend#identity_token_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#identity_token_key GcpAuthBackend#identity_token_key}
---
@@ -221,7 +221,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The TTL of generated tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#identity_token_ttl GcpAuthBackend#identity_token_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#identity_token_ttl GcpAuthBackend#identity_token_ttl}
---
@@ -231,7 +231,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Specifies if the auth method is local only.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#local GcpAuthBackend#local}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#local GcpAuthBackend#local}
---
@@ -241,7 +241,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#namespace GcpAuthBackend#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#namespace GcpAuthBackend#namespace}
---
@@ -249,7 +249,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#path GcpAuthBackend#path}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#path GcpAuthBackend#path}.
---
@@ -257,7 +257,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#private_key_id GcpAuthBackend#private_key_id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#private_key_id GcpAuthBackend#private_key_id}.
---
@@ -265,7 +265,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#project_id GcpAuthBackend#project_id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#project_id GcpAuthBackend#project_id}.
---
@@ -275,7 +275,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Service Account to impersonate for plugin workload identity federation.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#service_account_email GcpAuthBackend#service_account_email}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#service_account_email GcpAuthBackend#service_account_email}
---
@@ -283,7 +283,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* typing.Union[cdktf.IResolvable, typing.List[GcpAuthBackendTune]]
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#tune GcpAuthBackend#tune}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#tune GcpAuthBackend#tune}.
---
@@ -678,7 +678,7 @@ def put_custom_endpoint(
Replaces the service endpoint used in API requests to https://www.googleapis.com.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#api GcpAuthBackend#api}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#api GcpAuthBackend#api}
---
@@ -688,7 +688,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Replaces the service endpoint used in API requests to `https://compute.googleapis.com`.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#compute GcpAuthBackend#compute}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#compute GcpAuthBackend#compute}
---
@@ -698,7 +698,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Replaces the service endpoint used in API requests to `https://cloudresourcemanager.googleapis.com`.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#crm GcpAuthBackend#crm}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#crm GcpAuthBackend#crm}
---
@@ -708,7 +708,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Replaces the service endpoint used in API requests to `https://iam.googleapis.com`.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#iam GcpAuthBackend#iam}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#iam GcpAuthBackend#iam}
---
@@ -942,7 +942,7 @@ The construct id used in the generated config for the GcpAuthBackend to import.
The id of the existing GcpAuthBackend that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#import import section} in the documentation of this resource for the id to use
---
@@ -1568,23 +1568,23 @@ gcpAuthBackend.GcpAuthBackendConfig(
| lifecycle
| cdktf.TerraformResourceLifecycle
| *No description.* |
| provider
| cdktf.TerraformProvider
| *No description.* |
| provisioners
| typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]]
| *No description.* |
-| client_email
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#client_email GcpAuthBackend#client_email}. |
-| client_id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#client_id GcpAuthBackend#client_id}. |
-| credentials
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#credentials GcpAuthBackend#credentials}. |
+| client_email
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#client_email GcpAuthBackend#client_email}. |
+| client_id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#client_id GcpAuthBackend#client_id}. |
+| credentials
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#credentials GcpAuthBackend#credentials}. |
| custom_endpoint
| GcpAuthBackendCustomEndpoint
| custom_endpoint block. |
-| description
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#description GcpAuthBackend#description}. |
+| description
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#description GcpAuthBackend#description}. |
| disable_remount
| typing.Union[bool, cdktf.IResolvable]
| If set, opts out of mount migration on path updates. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#id GcpAuthBackend#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#id GcpAuthBackend#id}. |
| identity_token_audience
| str
| The audience claim value for plugin identity tokens. |
| identity_token_key
| str
| The key to use for signing identity tokens. |
| identity_token_ttl
| typing.Union[int, float]
| The TTL of generated tokens. |
| local
| typing.Union[bool, cdktf.IResolvable]
| Specifies if the auth method is local only. |
| namespace
| str
| Target namespace. (requires Enterprise). |
-| path
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#path GcpAuthBackend#path}. |
-| private_key_id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#private_key_id GcpAuthBackend#private_key_id}. |
-| project_id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#project_id GcpAuthBackend#project_id}. |
+| path
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#path GcpAuthBackend#path}. |
+| private_key_id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#private_key_id GcpAuthBackend#private_key_id}. |
+| project_id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#project_id GcpAuthBackend#project_id}. |
| service_account_email
| str
| Service Account to impersonate for plugin workload identity federation. |
-| tune
| typing.Union[cdktf.IResolvable, typing.List[GcpAuthBackendTune]]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#tune GcpAuthBackend#tune}. |
+| tune
| typing.Union[cdktf.IResolvable, typing.List[GcpAuthBackendTune]]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#tune GcpAuthBackend#tune}. |
---
@@ -1666,7 +1666,7 @@ client_email: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#client_email GcpAuthBackend#client_email}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#client_email GcpAuthBackend#client_email}.
---
@@ -1678,7 +1678,7 @@ client_id: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#client_id GcpAuthBackend#client_id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#client_id GcpAuthBackend#client_id}.
---
@@ -1690,7 +1690,7 @@ credentials: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#credentials GcpAuthBackend#credentials}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#credentials GcpAuthBackend#credentials}.
---
@@ -1704,7 +1704,7 @@ custom_endpoint: GcpAuthBackendCustomEndpoint
custom_endpoint block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#custom_endpoint GcpAuthBackend#custom_endpoint}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#custom_endpoint GcpAuthBackend#custom_endpoint}
---
@@ -1716,7 +1716,7 @@ description: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#description GcpAuthBackend#description}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#description GcpAuthBackend#description}.
---
@@ -1730,7 +1730,7 @@ disable_remount: typing.Union[bool, IResolvable]
If set, opts out of mount migration on path updates.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#disable_remount GcpAuthBackend#disable_remount}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#disable_remount GcpAuthBackend#disable_remount}
---
@@ -1742,7 +1742,7 @@ id: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#id GcpAuthBackend#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#id GcpAuthBackend#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1759,7 +1759,7 @@ identity_token_audience: str
The audience claim value for plugin identity tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#identity_token_audience GcpAuthBackend#identity_token_audience}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#identity_token_audience GcpAuthBackend#identity_token_audience}
---
@@ -1773,7 +1773,7 @@ identity_token_key: str
The key to use for signing identity tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#identity_token_key GcpAuthBackend#identity_token_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#identity_token_key GcpAuthBackend#identity_token_key}
---
@@ -1787,7 +1787,7 @@ identity_token_ttl: typing.Union[int, float]
The TTL of generated tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#identity_token_ttl GcpAuthBackend#identity_token_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#identity_token_ttl GcpAuthBackend#identity_token_ttl}
---
@@ -1801,7 +1801,7 @@ local: typing.Union[bool, IResolvable]
Specifies if the auth method is local only.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#local GcpAuthBackend#local}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#local GcpAuthBackend#local}
---
@@ -1815,7 +1815,7 @@ namespace: str
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#namespace GcpAuthBackend#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#namespace GcpAuthBackend#namespace}
---
@@ -1827,7 +1827,7 @@ path: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#path GcpAuthBackend#path}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#path GcpAuthBackend#path}.
---
@@ -1839,7 +1839,7 @@ private_key_id: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#private_key_id GcpAuthBackend#private_key_id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#private_key_id GcpAuthBackend#private_key_id}.
---
@@ -1851,7 +1851,7 @@ project_id: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#project_id GcpAuthBackend#project_id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#project_id GcpAuthBackend#project_id}.
---
@@ -1865,7 +1865,7 @@ service_account_email: str
Service Account to impersonate for plugin workload identity federation.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#service_account_email GcpAuthBackend#service_account_email}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#service_account_email GcpAuthBackend#service_account_email}
---
@@ -1877,7 +1877,7 @@ tune: typing.Union[IResolvable, typing.List[GcpAuthBackendTune]]
- *Type:* typing.Union[cdktf.IResolvable, typing.List[GcpAuthBackendTune]]
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#tune GcpAuthBackend#tune}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#tune GcpAuthBackend#tune}.
---
@@ -1917,7 +1917,7 @@ api: str
Replaces the service endpoint used in API requests to https://www.googleapis.com.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#api GcpAuthBackend#api}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#api GcpAuthBackend#api}
---
@@ -1931,7 +1931,7 @@ compute: str
Replaces the service endpoint used in API requests to `https://compute.googleapis.com`.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#compute GcpAuthBackend#compute}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#compute GcpAuthBackend#compute}
---
@@ -1945,7 +1945,7 @@ crm: str
Replaces the service endpoint used in API requests to `https://cloudresourcemanager.googleapis.com`.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#crm GcpAuthBackend#crm}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#crm GcpAuthBackend#crm}
---
@@ -1959,7 +1959,7 @@ iam: str
Replaces the service endpoint used in API requests to `https://iam.googleapis.com`.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#iam GcpAuthBackend#iam}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#iam GcpAuthBackend#iam}
---
@@ -1986,14 +1986,14 @@ gcpAuthBackend.GcpAuthBackendTune(
| **Name** | **Type** | **Description** |
| --- | --- | --- |
-| allowed_response_headers
| typing.List[str]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#allowed_response_headers GcpAuthBackend#allowed_response_headers}. |
-| audit_non_hmac_request_keys
| typing.List[str]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#audit_non_hmac_request_keys GcpAuthBackend#audit_non_hmac_request_keys}. |
-| audit_non_hmac_response_keys
| typing.List[str]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#audit_non_hmac_response_keys GcpAuthBackend#audit_non_hmac_response_keys}. |
-| default_lease_ttl
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#default_lease_ttl GcpAuthBackend#default_lease_ttl}. |
-| listing_visibility
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#listing_visibility GcpAuthBackend#listing_visibility}. |
-| max_lease_ttl
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#max_lease_ttl GcpAuthBackend#max_lease_ttl}. |
-| passthrough_request_headers
| typing.List[str]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#passthrough_request_headers GcpAuthBackend#passthrough_request_headers}. |
-| token_type
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#token_type GcpAuthBackend#token_type}. |
+| allowed_response_headers
| typing.List[str]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#allowed_response_headers GcpAuthBackend#allowed_response_headers}. |
+| audit_non_hmac_request_keys
| typing.List[str]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#audit_non_hmac_request_keys GcpAuthBackend#audit_non_hmac_request_keys}. |
+| audit_non_hmac_response_keys
| typing.List[str]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#audit_non_hmac_response_keys GcpAuthBackend#audit_non_hmac_response_keys}. |
+| default_lease_ttl
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#default_lease_ttl GcpAuthBackend#default_lease_ttl}. |
+| listing_visibility
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#listing_visibility GcpAuthBackend#listing_visibility}. |
+| max_lease_ttl
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#max_lease_ttl GcpAuthBackend#max_lease_ttl}. |
+| passthrough_request_headers
| typing.List[str]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#passthrough_request_headers GcpAuthBackend#passthrough_request_headers}. |
+| token_type
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#token_type GcpAuthBackend#token_type}. |
---
@@ -2005,7 +2005,7 @@ allowed_response_headers: typing.List[str]
- *Type:* typing.List[str]
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#allowed_response_headers GcpAuthBackend#allowed_response_headers}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#allowed_response_headers GcpAuthBackend#allowed_response_headers}.
---
@@ -2017,7 +2017,7 @@ audit_non_hmac_request_keys: typing.List[str]
- *Type:* typing.List[str]
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#audit_non_hmac_request_keys GcpAuthBackend#audit_non_hmac_request_keys}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#audit_non_hmac_request_keys GcpAuthBackend#audit_non_hmac_request_keys}.
---
@@ -2029,7 +2029,7 @@ audit_non_hmac_response_keys: typing.List[str]
- *Type:* typing.List[str]
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#audit_non_hmac_response_keys GcpAuthBackend#audit_non_hmac_response_keys}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#audit_non_hmac_response_keys GcpAuthBackend#audit_non_hmac_response_keys}.
---
@@ -2041,7 +2041,7 @@ default_lease_ttl: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#default_lease_ttl GcpAuthBackend#default_lease_ttl}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#default_lease_ttl GcpAuthBackend#default_lease_ttl}.
---
@@ -2053,7 +2053,7 @@ listing_visibility: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#listing_visibility GcpAuthBackend#listing_visibility}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#listing_visibility GcpAuthBackend#listing_visibility}.
---
@@ -2065,7 +2065,7 @@ max_lease_ttl: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#max_lease_ttl GcpAuthBackend#max_lease_ttl}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#max_lease_ttl GcpAuthBackend#max_lease_ttl}.
---
@@ -2077,7 +2077,7 @@ passthrough_request_headers: typing.List[str]
- *Type:* typing.List[str]
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#passthrough_request_headers GcpAuthBackend#passthrough_request_headers}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#passthrough_request_headers GcpAuthBackend#passthrough_request_headers}.
---
@@ -2089,7 +2089,7 @@ token_type: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#token_type GcpAuthBackend#token_type}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#token_type GcpAuthBackend#token_type}.
---
diff --git a/docs/gcpAuthBackend.typescript.md b/docs/gcpAuthBackend.typescript.md
index cb8d37f2..e3209d0a 100644
--- a/docs/gcpAuthBackend.typescript.md
+++ b/docs/gcpAuthBackend.typescript.md
@@ -4,7 +4,7 @@
### GcpAuthBackend
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend vault_gcp_auth_backend}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend vault_gcp_auth_backend}.
#### Initializers
@@ -612,7 +612,7 @@ The construct id used in the generated config for the GcpAuthBackend to import.
The id of the existing GcpAuthBackend that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#import import section} in the documentation of this resource for the id to use
---
@@ -1213,23 +1213,23 @@ const gcpAuthBackendConfig: gcpAuthBackend.GcpAuthBackendConfig = { ... }
| lifecycle
| cdktf.TerraformResourceLifecycle
| *No description.* |
| provider
| cdktf.TerraformProvider
| *No description.* |
| provisioners
| cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[]
| *No description.* |
-| clientEmail
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#client_email GcpAuthBackend#client_email}. |
-| clientId
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#client_id GcpAuthBackend#client_id}. |
-| credentials
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#credentials GcpAuthBackend#credentials}. |
+| clientEmail
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#client_email GcpAuthBackend#client_email}. |
+| clientId
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#client_id GcpAuthBackend#client_id}. |
+| credentials
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#credentials GcpAuthBackend#credentials}. |
| customEndpoint
| GcpAuthBackendCustomEndpoint
| custom_endpoint block. |
-| description
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#description GcpAuthBackend#description}. |
+| description
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#description GcpAuthBackend#description}. |
| disableRemount
| boolean \| cdktf.IResolvable
| If set, opts out of mount migration on path updates. |
-| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#id GcpAuthBackend#id}. |
+| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#id GcpAuthBackend#id}. |
| identityTokenAudience
| string
| The audience claim value for plugin identity tokens. |
| identityTokenKey
| string
| The key to use for signing identity tokens. |
| identityTokenTtl
| number
| The TTL of generated tokens. |
| local
| boolean \| cdktf.IResolvable
| Specifies if the auth method is local only. |
| namespace
| string
| Target namespace. (requires Enterprise). |
-| path
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#path GcpAuthBackend#path}. |
-| privateKeyId
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#private_key_id GcpAuthBackend#private_key_id}. |
-| projectId
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#project_id GcpAuthBackend#project_id}. |
+| path
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#path GcpAuthBackend#path}. |
+| privateKeyId
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#private_key_id GcpAuthBackend#private_key_id}. |
+| projectId
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#project_id GcpAuthBackend#project_id}. |
| serviceAccountEmail
| string
| Service Account to impersonate for plugin workload identity federation. |
-| tune
| cdktf.IResolvable \| GcpAuthBackendTune[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#tune GcpAuthBackend#tune}. |
+| tune
| cdktf.IResolvable \| GcpAuthBackendTune[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#tune GcpAuthBackend#tune}. |
---
@@ -1311,7 +1311,7 @@ public readonly clientEmail: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#client_email GcpAuthBackend#client_email}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#client_email GcpAuthBackend#client_email}.
---
@@ -1323,7 +1323,7 @@ public readonly clientId: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#client_id GcpAuthBackend#client_id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#client_id GcpAuthBackend#client_id}.
---
@@ -1335,7 +1335,7 @@ public readonly credentials: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#credentials GcpAuthBackend#credentials}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#credentials GcpAuthBackend#credentials}.
---
@@ -1349,7 +1349,7 @@ public readonly customEndpoint: GcpAuthBackendCustomEndpoint;
custom_endpoint block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#custom_endpoint GcpAuthBackend#custom_endpoint}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#custom_endpoint GcpAuthBackend#custom_endpoint}
---
@@ -1361,7 +1361,7 @@ public readonly description: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#description GcpAuthBackend#description}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#description GcpAuthBackend#description}.
---
@@ -1375,7 +1375,7 @@ public readonly disableRemount: boolean | IResolvable;
If set, opts out of mount migration on path updates.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#disable_remount GcpAuthBackend#disable_remount}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#disable_remount GcpAuthBackend#disable_remount}
---
@@ -1387,7 +1387,7 @@ public readonly id: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#id GcpAuthBackend#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#id GcpAuthBackend#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1404,7 +1404,7 @@ public readonly identityTokenAudience: string;
The audience claim value for plugin identity tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#identity_token_audience GcpAuthBackend#identity_token_audience}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#identity_token_audience GcpAuthBackend#identity_token_audience}
---
@@ -1418,7 +1418,7 @@ public readonly identityTokenKey: string;
The key to use for signing identity tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#identity_token_key GcpAuthBackend#identity_token_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#identity_token_key GcpAuthBackend#identity_token_key}
---
@@ -1432,7 +1432,7 @@ public readonly identityTokenTtl: number;
The TTL of generated tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#identity_token_ttl GcpAuthBackend#identity_token_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#identity_token_ttl GcpAuthBackend#identity_token_ttl}
---
@@ -1446,7 +1446,7 @@ public readonly local: boolean | IResolvable;
Specifies if the auth method is local only.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#local GcpAuthBackend#local}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#local GcpAuthBackend#local}
---
@@ -1460,7 +1460,7 @@ public readonly namespace: string;
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#namespace GcpAuthBackend#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#namespace GcpAuthBackend#namespace}
---
@@ -1472,7 +1472,7 @@ public readonly path: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#path GcpAuthBackend#path}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#path GcpAuthBackend#path}.
---
@@ -1484,7 +1484,7 @@ public readonly privateKeyId: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#private_key_id GcpAuthBackend#private_key_id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#private_key_id GcpAuthBackend#private_key_id}.
---
@@ -1496,7 +1496,7 @@ public readonly projectId: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#project_id GcpAuthBackend#project_id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#project_id GcpAuthBackend#project_id}.
---
@@ -1510,7 +1510,7 @@ public readonly serviceAccountEmail: string;
Service Account to impersonate for plugin workload identity federation.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#service_account_email GcpAuthBackend#service_account_email}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#service_account_email GcpAuthBackend#service_account_email}
---
@@ -1522,7 +1522,7 @@ public readonly tune: IResolvable | GcpAuthBackendTune[];
- *Type:* cdktf.IResolvable | GcpAuthBackendTune[]
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#tune GcpAuthBackend#tune}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#tune GcpAuthBackend#tune}.
---
@@ -1557,7 +1557,7 @@ public readonly api: string;
Replaces the service endpoint used in API requests to https://www.googleapis.com.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#api GcpAuthBackend#api}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#api GcpAuthBackend#api}
---
@@ -1571,7 +1571,7 @@ public readonly compute: string;
Replaces the service endpoint used in API requests to `https://compute.googleapis.com`.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#compute GcpAuthBackend#compute}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#compute GcpAuthBackend#compute}
---
@@ -1585,7 +1585,7 @@ public readonly crm: string;
Replaces the service endpoint used in API requests to `https://cloudresourcemanager.googleapis.com`.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#crm GcpAuthBackend#crm}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#crm GcpAuthBackend#crm}
---
@@ -1599,7 +1599,7 @@ public readonly iam: string;
Replaces the service endpoint used in API requests to `https://iam.googleapis.com`.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#iam GcpAuthBackend#iam}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#iam GcpAuthBackend#iam}
---
@@ -1617,14 +1617,14 @@ const gcpAuthBackendTune: gcpAuthBackend.GcpAuthBackendTune = { ... }
| **Name** | **Type** | **Description** |
| --- | --- | --- |
-| allowedResponseHeaders
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#allowed_response_headers GcpAuthBackend#allowed_response_headers}. |
-| auditNonHmacRequestKeys
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#audit_non_hmac_request_keys GcpAuthBackend#audit_non_hmac_request_keys}. |
-| auditNonHmacResponseKeys
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#audit_non_hmac_response_keys GcpAuthBackend#audit_non_hmac_response_keys}. |
-| defaultLeaseTtl
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#default_lease_ttl GcpAuthBackend#default_lease_ttl}. |
-| listingVisibility
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#listing_visibility GcpAuthBackend#listing_visibility}. |
-| maxLeaseTtl
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#max_lease_ttl GcpAuthBackend#max_lease_ttl}. |
-| passthroughRequestHeaders
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#passthrough_request_headers GcpAuthBackend#passthrough_request_headers}. |
-| tokenType
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#token_type GcpAuthBackend#token_type}. |
+| allowedResponseHeaders
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#allowed_response_headers GcpAuthBackend#allowed_response_headers}. |
+| auditNonHmacRequestKeys
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#audit_non_hmac_request_keys GcpAuthBackend#audit_non_hmac_request_keys}. |
+| auditNonHmacResponseKeys
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#audit_non_hmac_response_keys GcpAuthBackend#audit_non_hmac_response_keys}. |
+| defaultLeaseTtl
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#default_lease_ttl GcpAuthBackend#default_lease_ttl}. |
+| listingVisibility
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#listing_visibility GcpAuthBackend#listing_visibility}. |
+| maxLeaseTtl
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#max_lease_ttl GcpAuthBackend#max_lease_ttl}. |
+| passthroughRequestHeaders
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#passthrough_request_headers GcpAuthBackend#passthrough_request_headers}. |
+| tokenType
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#token_type GcpAuthBackend#token_type}. |
---
@@ -1636,7 +1636,7 @@ public readonly allowedResponseHeaders: string[];
- *Type:* string[]
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#allowed_response_headers GcpAuthBackend#allowed_response_headers}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#allowed_response_headers GcpAuthBackend#allowed_response_headers}.
---
@@ -1648,7 +1648,7 @@ public readonly auditNonHmacRequestKeys: string[];
- *Type:* string[]
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#audit_non_hmac_request_keys GcpAuthBackend#audit_non_hmac_request_keys}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#audit_non_hmac_request_keys GcpAuthBackend#audit_non_hmac_request_keys}.
---
@@ -1660,7 +1660,7 @@ public readonly auditNonHmacResponseKeys: string[];
- *Type:* string[]
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#audit_non_hmac_response_keys GcpAuthBackend#audit_non_hmac_response_keys}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#audit_non_hmac_response_keys GcpAuthBackend#audit_non_hmac_response_keys}.
---
@@ -1672,7 +1672,7 @@ public readonly defaultLeaseTtl: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#default_lease_ttl GcpAuthBackend#default_lease_ttl}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#default_lease_ttl GcpAuthBackend#default_lease_ttl}.
---
@@ -1684,7 +1684,7 @@ public readonly listingVisibility: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#listing_visibility GcpAuthBackend#listing_visibility}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#listing_visibility GcpAuthBackend#listing_visibility}.
---
@@ -1696,7 +1696,7 @@ public readonly maxLeaseTtl: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#max_lease_ttl GcpAuthBackend#max_lease_ttl}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#max_lease_ttl GcpAuthBackend#max_lease_ttl}.
---
@@ -1708,7 +1708,7 @@ public readonly passthroughRequestHeaders: string[];
- *Type:* string[]
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#passthrough_request_headers GcpAuthBackend#passthrough_request_headers}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#passthrough_request_headers GcpAuthBackend#passthrough_request_headers}.
---
@@ -1720,7 +1720,7 @@ public readonly tokenType: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#token_type GcpAuthBackend#token_type}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#token_type GcpAuthBackend#token_type}.
---
diff --git a/docs/gcpAuthBackendRole.csharp.md b/docs/gcpAuthBackendRole.csharp.md
index 6ca5ee19..609b6092 100644
--- a/docs/gcpAuthBackendRole.csharp.md
+++ b/docs/gcpAuthBackendRole.csharp.md
@@ -4,7 +4,7 @@
### GcpAuthBackendRole
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role vault_gcp_auth_backend_role}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role vault_gcp_auth_backend_role}.
#### Initializers
@@ -614,7 +614,7 @@ The construct id used in the generated config for the GcpAuthBackendRole to impo
The id of the existing GcpAuthBackendRole that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#import import section} in the documentation of this resource for the id to use
---
@@ -1367,19 +1367,19 @@ new GcpAuthBackendRoleConfig {
| Lifecycle
| HashiCorp.Cdktf.TerraformResourceLifecycle
| *No description.* |
| Provider
| HashiCorp.Cdktf.TerraformProvider
| *No description.* |
| Provisioners
| object[]
| *No description.* |
-| Role
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#role GcpAuthBackendRole#role}. |
-| Type
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#type GcpAuthBackendRole#type}. |
-| AddGroupAliases
| object
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#add_group_aliases GcpAuthBackendRole#add_group_aliases}. |
-| AllowGceInference
| object
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#allow_gce_inference GcpAuthBackendRole#allow_gce_inference}. |
-| Backend
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#backend GcpAuthBackendRole#backend}. |
-| BoundInstanceGroups
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_instance_groups GcpAuthBackendRole#bound_instance_groups}. |
-| BoundLabels
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_labels GcpAuthBackendRole#bound_labels}. |
-| BoundProjects
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_projects GcpAuthBackendRole#bound_projects}. |
-| BoundRegions
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_regions GcpAuthBackendRole#bound_regions}. |
-| BoundServiceAccounts
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_service_accounts GcpAuthBackendRole#bound_service_accounts}. |
-| BoundZones
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_zones GcpAuthBackendRole#bound_zones}. |
-| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#id GcpAuthBackendRole#id}. |
-| MaxJwtExp
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#max_jwt_exp GcpAuthBackendRole#max_jwt_exp}. |
+| Role
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#role GcpAuthBackendRole#role}. |
+| Type
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#type GcpAuthBackendRole#type}. |
+| AddGroupAliases
| object
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#add_group_aliases GcpAuthBackendRole#add_group_aliases}. |
+| AllowGceInference
| object
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#allow_gce_inference GcpAuthBackendRole#allow_gce_inference}. |
+| Backend
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#backend GcpAuthBackendRole#backend}. |
+| BoundInstanceGroups
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_instance_groups GcpAuthBackendRole#bound_instance_groups}. |
+| BoundLabels
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_labels GcpAuthBackendRole#bound_labels}. |
+| BoundProjects
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_projects GcpAuthBackendRole#bound_projects}. |
+| BoundRegions
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_regions GcpAuthBackendRole#bound_regions}. |
+| BoundServiceAccounts
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_service_accounts GcpAuthBackendRole#bound_service_accounts}. |
+| BoundZones
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_zones GcpAuthBackendRole#bound_zones}. |
+| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#id GcpAuthBackendRole#id}. |
+| MaxJwtExp
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#max_jwt_exp GcpAuthBackendRole#max_jwt_exp}. |
| Namespace
| string
| Target namespace. (requires Enterprise). |
| TokenBoundCidrs
| string[]
| Specifies the blocks of IP addresses which are allowed to use the generated token. |
| TokenExplicitMaxTtl
| double
| Generated Token's Explicit Maximum TTL in seconds. |
@@ -1471,7 +1471,7 @@ public string Role { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#role GcpAuthBackendRole#role}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#role GcpAuthBackendRole#role}.
---
@@ -1483,7 +1483,7 @@ public string Type { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#type GcpAuthBackendRole#type}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#type GcpAuthBackendRole#type}.
---
@@ -1495,7 +1495,7 @@ public object AddGroupAliases { get; set; }
- *Type:* object
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#add_group_aliases GcpAuthBackendRole#add_group_aliases}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#add_group_aliases GcpAuthBackendRole#add_group_aliases}.
---
@@ -1507,7 +1507,7 @@ public object AllowGceInference { get; set; }
- *Type:* object
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#allow_gce_inference GcpAuthBackendRole#allow_gce_inference}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#allow_gce_inference GcpAuthBackendRole#allow_gce_inference}.
---
@@ -1519,7 +1519,7 @@ public string Backend { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#backend GcpAuthBackendRole#backend}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#backend GcpAuthBackendRole#backend}.
---
@@ -1531,7 +1531,7 @@ public string[] BoundInstanceGroups { get; set; }
- *Type:* string[]
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_instance_groups GcpAuthBackendRole#bound_instance_groups}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_instance_groups GcpAuthBackendRole#bound_instance_groups}.
---
@@ -1543,7 +1543,7 @@ public string[] BoundLabels { get; set; }
- *Type:* string[]
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_labels GcpAuthBackendRole#bound_labels}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_labels GcpAuthBackendRole#bound_labels}.
---
@@ -1555,7 +1555,7 @@ public string[] BoundProjects { get; set; }
- *Type:* string[]
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_projects GcpAuthBackendRole#bound_projects}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_projects GcpAuthBackendRole#bound_projects}.
---
@@ -1567,7 +1567,7 @@ public string[] BoundRegions { get; set; }
- *Type:* string[]
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_regions GcpAuthBackendRole#bound_regions}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_regions GcpAuthBackendRole#bound_regions}.
---
@@ -1579,7 +1579,7 @@ public string[] BoundServiceAccounts { get; set; }
- *Type:* string[]
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_service_accounts GcpAuthBackendRole#bound_service_accounts}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_service_accounts GcpAuthBackendRole#bound_service_accounts}.
---
@@ -1591,7 +1591,7 @@ public string[] BoundZones { get; set; }
- *Type:* string[]
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_zones GcpAuthBackendRole#bound_zones}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_zones GcpAuthBackendRole#bound_zones}.
---
@@ -1603,7 +1603,7 @@ public string Id { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#id GcpAuthBackendRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#id GcpAuthBackendRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1618,7 +1618,7 @@ public string MaxJwtExp { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#max_jwt_exp GcpAuthBackendRole#max_jwt_exp}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#max_jwt_exp GcpAuthBackendRole#max_jwt_exp}.
---
@@ -1632,7 +1632,7 @@ public string Namespace { get; set; }
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#namespace GcpAuthBackendRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#namespace GcpAuthBackendRole#namespace}
---
@@ -1646,7 +1646,7 @@ public string[] TokenBoundCidrs { get; set; }
Specifies the blocks of IP addresses which are allowed to use the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_bound_cidrs GcpAuthBackendRole#token_bound_cidrs}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_bound_cidrs GcpAuthBackendRole#token_bound_cidrs}
---
@@ -1660,7 +1660,7 @@ public double TokenExplicitMaxTtl { get; set; }
Generated Token's Explicit Maximum TTL in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_explicit_max_ttl GcpAuthBackendRole#token_explicit_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_explicit_max_ttl GcpAuthBackendRole#token_explicit_max_ttl}
---
@@ -1674,7 +1674,7 @@ public double TokenMaxTtl { get; set; }
The maximum lifetime of the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_max_ttl GcpAuthBackendRole#token_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_max_ttl GcpAuthBackendRole#token_max_ttl}
---
@@ -1688,7 +1688,7 @@ public object TokenNoDefaultPolicy { get; set; }
If true, the 'default' policy will not automatically be added to generated tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_no_default_policy GcpAuthBackendRole#token_no_default_policy}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_no_default_policy GcpAuthBackendRole#token_no_default_policy}
---
@@ -1702,7 +1702,7 @@ public double TokenNumUses { get; set; }
The maximum number of times a token may be used, a value of zero means unlimited.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_num_uses GcpAuthBackendRole#token_num_uses}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_num_uses GcpAuthBackendRole#token_num_uses}
---
@@ -1716,7 +1716,7 @@ public double TokenPeriod { get; set; }
Generated Token's Period.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_period GcpAuthBackendRole#token_period}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_period GcpAuthBackendRole#token_period}
---
@@ -1730,7 +1730,7 @@ public string[] TokenPolicies { get; set; }
Generated Token's Policies.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_policies GcpAuthBackendRole#token_policies}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_policies GcpAuthBackendRole#token_policies}
---
@@ -1744,7 +1744,7 @@ public double TokenTtl { get; set; }
The initial ttl of the token to generate in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_ttl GcpAuthBackendRole#token_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_ttl GcpAuthBackendRole#token_ttl}
---
@@ -1758,7 +1758,7 @@ public string TokenType { get; set; }
The type of token to generate, service or batch.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_type GcpAuthBackendRole#token_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_type GcpAuthBackendRole#token_type}
---
diff --git a/docs/gcpAuthBackendRole.go.md b/docs/gcpAuthBackendRole.go.md
index 594fe4ca..8a45f832 100644
--- a/docs/gcpAuthBackendRole.go.md
+++ b/docs/gcpAuthBackendRole.go.md
@@ -4,7 +4,7 @@
### GcpAuthBackendRole
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role vault_gcp_auth_backend_role}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role vault_gcp_auth_backend_role}.
#### Initializers
@@ -614,7 +614,7 @@ The construct id used in the generated config for the GcpAuthBackendRole to impo
The id of the existing GcpAuthBackendRole that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#import import section} in the documentation of this resource for the id to use
---
@@ -1367,19 +1367,19 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/gcpauthbackendrole"
| Lifecycle
| github.com/hashicorp/terraform-cdk-go/cdktf.TerraformResourceLifecycle
| *No description.* |
| Provider
| github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProvider
| *No description.* |
| Provisioners
| *[]interface{}
| *No description.* |
-| Role
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#role GcpAuthBackendRole#role}. |
-| Type
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#type GcpAuthBackendRole#type}. |
-| AddGroupAliases
| interface{}
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#add_group_aliases GcpAuthBackendRole#add_group_aliases}. |
-| AllowGceInference
| interface{}
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#allow_gce_inference GcpAuthBackendRole#allow_gce_inference}. |
-| Backend
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#backend GcpAuthBackendRole#backend}. |
-| BoundInstanceGroups
| *[]*string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_instance_groups GcpAuthBackendRole#bound_instance_groups}. |
-| BoundLabels
| *[]*string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_labels GcpAuthBackendRole#bound_labels}. |
-| BoundProjects
| *[]*string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_projects GcpAuthBackendRole#bound_projects}. |
-| BoundRegions
| *[]*string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_regions GcpAuthBackendRole#bound_regions}. |
-| BoundServiceAccounts
| *[]*string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_service_accounts GcpAuthBackendRole#bound_service_accounts}. |
-| BoundZones
| *[]*string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_zones GcpAuthBackendRole#bound_zones}. |
-| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#id GcpAuthBackendRole#id}. |
-| MaxJwtExp
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#max_jwt_exp GcpAuthBackendRole#max_jwt_exp}. |
+| Role
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#role GcpAuthBackendRole#role}. |
+| Type
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#type GcpAuthBackendRole#type}. |
+| AddGroupAliases
| interface{}
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#add_group_aliases GcpAuthBackendRole#add_group_aliases}. |
+| AllowGceInference
| interface{}
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#allow_gce_inference GcpAuthBackendRole#allow_gce_inference}. |
+| Backend
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#backend GcpAuthBackendRole#backend}. |
+| BoundInstanceGroups
| *[]*string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_instance_groups GcpAuthBackendRole#bound_instance_groups}. |
+| BoundLabels
| *[]*string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_labels GcpAuthBackendRole#bound_labels}. |
+| BoundProjects
| *[]*string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_projects GcpAuthBackendRole#bound_projects}. |
+| BoundRegions
| *[]*string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_regions GcpAuthBackendRole#bound_regions}. |
+| BoundServiceAccounts
| *[]*string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_service_accounts GcpAuthBackendRole#bound_service_accounts}. |
+| BoundZones
| *[]*string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_zones GcpAuthBackendRole#bound_zones}. |
+| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#id GcpAuthBackendRole#id}. |
+| MaxJwtExp
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#max_jwt_exp GcpAuthBackendRole#max_jwt_exp}. |
| Namespace
| *string
| Target namespace. (requires Enterprise). |
| TokenBoundCidrs
| *[]*string
| Specifies the blocks of IP addresses which are allowed to use the generated token. |
| TokenExplicitMaxTtl
| *f64
| Generated Token's Explicit Maximum TTL in seconds. |
@@ -1471,7 +1471,7 @@ Role *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#role GcpAuthBackendRole#role}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#role GcpAuthBackendRole#role}.
---
@@ -1483,7 +1483,7 @@ Type *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#type GcpAuthBackendRole#type}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#type GcpAuthBackendRole#type}.
---
@@ -1495,7 +1495,7 @@ AddGroupAliases interface{}
- *Type:* interface{}
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#add_group_aliases GcpAuthBackendRole#add_group_aliases}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#add_group_aliases GcpAuthBackendRole#add_group_aliases}.
---
@@ -1507,7 +1507,7 @@ AllowGceInference interface{}
- *Type:* interface{}
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#allow_gce_inference GcpAuthBackendRole#allow_gce_inference}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#allow_gce_inference GcpAuthBackendRole#allow_gce_inference}.
---
@@ -1519,7 +1519,7 @@ Backend *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#backend GcpAuthBackendRole#backend}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#backend GcpAuthBackendRole#backend}.
---
@@ -1531,7 +1531,7 @@ BoundInstanceGroups *[]*string
- *Type:* *[]*string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_instance_groups GcpAuthBackendRole#bound_instance_groups}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_instance_groups GcpAuthBackendRole#bound_instance_groups}.
---
@@ -1543,7 +1543,7 @@ BoundLabels *[]*string
- *Type:* *[]*string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_labels GcpAuthBackendRole#bound_labels}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_labels GcpAuthBackendRole#bound_labels}.
---
@@ -1555,7 +1555,7 @@ BoundProjects *[]*string
- *Type:* *[]*string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_projects GcpAuthBackendRole#bound_projects}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_projects GcpAuthBackendRole#bound_projects}.
---
@@ -1567,7 +1567,7 @@ BoundRegions *[]*string
- *Type:* *[]*string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_regions GcpAuthBackendRole#bound_regions}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_regions GcpAuthBackendRole#bound_regions}.
---
@@ -1579,7 +1579,7 @@ BoundServiceAccounts *[]*string
- *Type:* *[]*string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_service_accounts GcpAuthBackendRole#bound_service_accounts}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_service_accounts GcpAuthBackendRole#bound_service_accounts}.
---
@@ -1591,7 +1591,7 @@ BoundZones *[]*string
- *Type:* *[]*string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_zones GcpAuthBackendRole#bound_zones}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_zones GcpAuthBackendRole#bound_zones}.
---
@@ -1603,7 +1603,7 @@ Id *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#id GcpAuthBackendRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#id GcpAuthBackendRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1618,7 +1618,7 @@ MaxJwtExp *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#max_jwt_exp GcpAuthBackendRole#max_jwt_exp}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#max_jwt_exp GcpAuthBackendRole#max_jwt_exp}.
---
@@ -1632,7 +1632,7 @@ Namespace *string
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#namespace GcpAuthBackendRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#namespace GcpAuthBackendRole#namespace}
---
@@ -1646,7 +1646,7 @@ TokenBoundCidrs *[]*string
Specifies the blocks of IP addresses which are allowed to use the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_bound_cidrs GcpAuthBackendRole#token_bound_cidrs}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_bound_cidrs GcpAuthBackendRole#token_bound_cidrs}
---
@@ -1660,7 +1660,7 @@ TokenExplicitMaxTtl *f64
Generated Token's Explicit Maximum TTL in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_explicit_max_ttl GcpAuthBackendRole#token_explicit_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_explicit_max_ttl GcpAuthBackendRole#token_explicit_max_ttl}
---
@@ -1674,7 +1674,7 @@ TokenMaxTtl *f64
The maximum lifetime of the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_max_ttl GcpAuthBackendRole#token_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_max_ttl GcpAuthBackendRole#token_max_ttl}
---
@@ -1688,7 +1688,7 @@ TokenNoDefaultPolicy interface{}
If true, the 'default' policy will not automatically be added to generated tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_no_default_policy GcpAuthBackendRole#token_no_default_policy}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_no_default_policy GcpAuthBackendRole#token_no_default_policy}
---
@@ -1702,7 +1702,7 @@ TokenNumUses *f64
The maximum number of times a token may be used, a value of zero means unlimited.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_num_uses GcpAuthBackendRole#token_num_uses}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_num_uses GcpAuthBackendRole#token_num_uses}
---
@@ -1716,7 +1716,7 @@ TokenPeriod *f64
Generated Token's Period.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_period GcpAuthBackendRole#token_period}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_period GcpAuthBackendRole#token_period}
---
@@ -1730,7 +1730,7 @@ TokenPolicies *[]*string
Generated Token's Policies.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_policies GcpAuthBackendRole#token_policies}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_policies GcpAuthBackendRole#token_policies}
---
@@ -1744,7 +1744,7 @@ TokenTtl *f64
The initial ttl of the token to generate in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_ttl GcpAuthBackendRole#token_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_ttl GcpAuthBackendRole#token_ttl}
---
@@ -1758,7 +1758,7 @@ TokenType *string
The type of token to generate, service or batch.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_type GcpAuthBackendRole#token_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_type GcpAuthBackendRole#token_type}
---
diff --git a/docs/gcpAuthBackendRole.java.md b/docs/gcpAuthBackendRole.java.md
index 03070b03..b3ca7f6d 100644
--- a/docs/gcpAuthBackendRole.java.md
+++ b/docs/gcpAuthBackendRole.java.md
@@ -4,7 +4,7 @@
### GcpAuthBackendRole
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role vault_gcp_auth_backend_role}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role vault_gcp_auth_backend_role}.
#### Initializers
@@ -63,19 +63,19 @@ GcpAuthBackendRole.Builder.create(Construct scope, java.lang.String id)
| lifecycle
| com.hashicorp.cdktf.TerraformResourceLifecycle
| *No description.* |
| provider
| com.hashicorp.cdktf.TerraformProvider
| *No description.* |
| provisioners
| java.util.List
| *No description.* |
-| role
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#role GcpAuthBackendRole#role}. |
-| type
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#type GcpAuthBackendRole#type}. |
-| addGroupAliases
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#add_group_aliases GcpAuthBackendRole#add_group_aliases}. |
-| allowGceInference
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#allow_gce_inference GcpAuthBackendRole#allow_gce_inference}. |
-| backend
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#backend GcpAuthBackendRole#backend}. |
-| boundInstanceGroups
| java.util.List
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_instance_groups GcpAuthBackendRole#bound_instance_groups}. |
-| boundLabels
| java.util.List
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_labels GcpAuthBackendRole#bound_labels}. |
-| boundProjects
| java.util.List
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_projects GcpAuthBackendRole#bound_projects}. |
-| boundRegions
| java.util.List
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_regions GcpAuthBackendRole#bound_regions}. |
-| boundServiceAccounts
| java.util.List
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_service_accounts GcpAuthBackendRole#bound_service_accounts}. |
-| boundZones
| java.util.List
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_zones GcpAuthBackendRole#bound_zones}. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#id GcpAuthBackendRole#id}. |
-| maxJwtExp
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#max_jwt_exp GcpAuthBackendRole#max_jwt_exp}. |
+| role
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#role GcpAuthBackendRole#role}. |
+| type
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#type GcpAuthBackendRole#type}. |
+| addGroupAliases
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#add_group_aliases GcpAuthBackendRole#add_group_aliases}. |
+| allowGceInference
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#allow_gce_inference GcpAuthBackendRole#allow_gce_inference}. |
+| backend
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#backend GcpAuthBackendRole#backend}. |
+| boundInstanceGroups
| java.util.List
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_instance_groups GcpAuthBackendRole#bound_instance_groups}. |
+| boundLabels
| java.util.List
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_labels GcpAuthBackendRole#bound_labels}. |
+| boundProjects
| java.util.List
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_projects GcpAuthBackendRole#bound_projects}. |
+| boundRegions
| java.util.List
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_regions GcpAuthBackendRole#bound_regions}. |
+| boundServiceAccounts
| java.util.List
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_service_accounts GcpAuthBackendRole#bound_service_accounts}. |
+| boundZones
| java.util.List
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_zones GcpAuthBackendRole#bound_zones}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#id GcpAuthBackendRole#id}. |
+| maxJwtExp
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#max_jwt_exp GcpAuthBackendRole#max_jwt_exp}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
| tokenBoundCidrs
| java.util.List
| Specifies the blocks of IP addresses which are allowed to use the generated token. |
| tokenExplicitMaxTtl
| java.lang.Number
| Generated Token's Explicit Maximum TTL in seconds. |
@@ -153,7 +153,7 @@ Must be unique amongst siblings in the same scope
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#role GcpAuthBackendRole#role}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#role GcpAuthBackendRole#role}.
---
@@ -161,7 +161,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#type GcpAuthBackendRole#type}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#type GcpAuthBackendRole#type}.
---
@@ -169,7 +169,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#add_group_aliases GcpAuthBackendRole#add_group_aliases}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#add_group_aliases GcpAuthBackendRole#add_group_aliases}.
---
@@ -177,7 +177,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#allow_gce_inference GcpAuthBackendRole#allow_gce_inference}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#allow_gce_inference GcpAuthBackendRole#allow_gce_inference}.
---
@@ -185,7 +185,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#backend GcpAuthBackendRole#backend}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#backend GcpAuthBackendRole#backend}.
---
@@ -193,7 +193,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* java.util.List
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_instance_groups GcpAuthBackendRole#bound_instance_groups}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_instance_groups GcpAuthBackendRole#bound_instance_groups}.
---
@@ -201,7 +201,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* java.util.List
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_labels GcpAuthBackendRole#bound_labels}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_labels GcpAuthBackendRole#bound_labels}.
---
@@ -209,7 +209,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* java.util.List
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_projects GcpAuthBackendRole#bound_projects}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_projects GcpAuthBackendRole#bound_projects}.
---
@@ -217,7 +217,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* java.util.List
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_regions GcpAuthBackendRole#bound_regions}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_regions GcpAuthBackendRole#bound_regions}.
---
@@ -225,7 +225,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* java.util.List
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_service_accounts GcpAuthBackendRole#bound_service_accounts}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_service_accounts GcpAuthBackendRole#bound_service_accounts}.
---
@@ -233,7 +233,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* java.util.List
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_zones GcpAuthBackendRole#bound_zones}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_zones GcpAuthBackendRole#bound_zones}.
---
@@ -241,7 +241,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#id GcpAuthBackendRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#id GcpAuthBackendRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -252,7 +252,7 @@ If you experience problems setting this value it might not be settable. Please t
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#max_jwt_exp GcpAuthBackendRole#max_jwt_exp}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#max_jwt_exp GcpAuthBackendRole#max_jwt_exp}.
---
@@ -262,7 +262,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#namespace GcpAuthBackendRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#namespace GcpAuthBackendRole#namespace}
---
@@ -272,7 +272,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Specifies the blocks of IP addresses which are allowed to use the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_bound_cidrs GcpAuthBackendRole#token_bound_cidrs}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_bound_cidrs GcpAuthBackendRole#token_bound_cidrs}
---
@@ -282,7 +282,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Generated Token's Explicit Maximum TTL in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_explicit_max_ttl GcpAuthBackendRole#token_explicit_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_explicit_max_ttl GcpAuthBackendRole#token_explicit_max_ttl}
---
@@ -292,7 +292,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The maximum lifetime of the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_max_ttl GcpAuthBackendRole#token_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_max_ttl GcpAuthBackendRole#token_max_ttl}
---
@@ -302,7 +302,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
If true, the 'default' policy will not automatically be added to generated tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_no_default_policy GcpAuthBackendRole#token_no_default_policy}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_no_default_policy GcpAuthBackendRole#token_no_default_policy}
---
@@ -312,7 +312,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The maximum number of times a token may be used, a value of zero means unlimited.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_num_uses GcpAuthBackendRole#token_num_uses}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_num_uses GcpAuthBackendRole#token_num_uses}
---
@@ -322,7 +322,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Generated Token's Period.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_period GcpAuthBackendRole#token_period}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_period GcpAuthBackendRole#token_period}
---
@@ -332,7 +332,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Generated Token's Policies.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_policies GcpAuthBackendRole#token_policies}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_policies GcpAuthBackendRole#token_policies}
---
@@ -342,7 +342,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The initial ttl of the token to generate in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_ttl GcpAuthBackendRole#token_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_ttl GcpAuthBackendRole#token_ttl}
---
@@ -352,7 +352,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The type of token to generate, service or batch.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_type GcpAuthBackendRole#token_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_type GcpAuthBackendRole#token_type}
---
@@ -926,7 +926,7 @@ The construct id used in the generated config for the GcpAuthBackendRole to impo
The id of the existing GcpAuthBackendRole that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#import import section} in the documentation of this resource for the id to use
---
@@ -1686,19 +1686,19 @@ GcpAuthBackendRoleConfig.builder()
| lifecycle
| com.hashicorp.cdktf.TerraformResourceLifecycle
| *No description.* |
| provider
| com.hashicorp.cdktf.TerraformProvider
| *No description.* |
| provisioners
| java.util.List
| *No description.* |
-| role
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#role GcpAuthBackendRole#role}. |
-| type
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#type GcpAuthBackendRole#type}. |
-| addGroupAliases
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#add_group_aliases GcpAuthBackendRole#add_group_aliases}. |
-| allowGceInference
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#allow_gce_inference GcpAuthBackendRole#allow_gce_inference}. |
-| backend
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#backend GcpAuthBackendRole#backend}. |
-| boundInstanceGroups
| java.util.List
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_instance_groups GcpAuthBackendRole#bound_instance_groups}. |
-| boundLabels
| java.util.List
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_labels GcpAuthBackendRole#bound_labels}. |
-| boundProjects
| java.util.List
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_projects GcpAuthBackendRole#bound_projects}. |
-| boundRegions
| java.util.List
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_regions GcpAuthBackendRole#bound_regions}. |
-| boundServiceAccounts
| java.util.List
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_service_accounts GcpAuthBackendRole#bound_service_accounts}. |
-| boundZones
| java.util.List
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_zones GcpAuthBackendRole#bound_zones}. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#id GcpAuthBackendRole#id}. |
-| maxJwtExp
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#max_jwt_exp GcpAuthBackendRole#max_jwt_exp}. |
+| role
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#role GcpAuthBackendRole#role}. |
+| type
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#type GcpAuthBackendRole#type}. |
+| addGroupAliases
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#add_group_aliases GcpAuthBackendRole#add_group_aliases}. |
+| allowGceInference
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#allow_gce_inference GcpAuthBackendRole#allow_gce_inference}. |
+| backend
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#backend GcpAuthBackendRole#backend}. |
+| boundInstanceGroups
| java.util.List
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_instance_groups GcpAuthBackendRole#bound_instance_groups}. |
+| boundLabels
| java.util.List
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_labels GcpAuthBackendRole#bound_labels}. |
+| boundProjects
| java.util.List
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_projects GcpAuthBackendRole#bound_projects}. |
+| boundRegions
| java.util.List
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_regions GcpAuthBackendRole#bound_regions}. |
+| boundServiceAccounts
| java.util.List
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_service_accounts GcpAuthBackendRole#bound_service_accounts}. |
+| boundZones
| java.util.List
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_zones GcpAuthBackendRole#bound_zones}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#id GcpAuthBackendRole#id}. |
+| maxJwtExp
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#max_jwt_exp GcpAuthBackendRole#max_jwt_exp}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
| tokenBoundCidrs
| java.util.List
| Specifies the blocks of IP addresses which are allowed to use the generated token. |
| tokenExplicitMaxTtl
| java.lang.Number
| Generated Token's Explicit Maximum TTL in seconds. |
@@ -1790,7 +1790,7 @@ public java.lang.String getRole();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#role GcpAuthBackendRole#role}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#role GcpAuthBackendRole#role}.
---
@@ -1802,7 +1802,7 @@ public java.lang.String getType();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#type GcpAuthBackendRole#type}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#type GcpAuthBackendRole#type}.
---
@@ -1814,7 +1814,7 @@ public java.lang.Object getAddGroupAliases();
- *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#add_group_aliases GcpAuthBackendRole#add_group_aliases}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#add_group_aliases GcpAuthBackendRole#add_group_aliases}.
---
@@ -1826,7 +1826,7 @@ public java.lang.Object getAllowGceInference();
- *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#allow_gce_inference GcpAuthBackendRole#allow_gce_inference}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#allow_gce_inference GcpAuthBackendRole#allow_gce_inference}.
---
@@ -1838,7 +1838,7 @@ public java.lang.String getBackend();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#backend GcpAuthBackendRole#backend}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#backend GcpAuthBackendRole#backend}.
---
@@ -1850,7 +1850,7 @@ public java.util.List getBoundInstanceGroups();
- *Type:* java.util.List
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_instance_groups GcpAuthBackendRole#bound_instance_groups}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_instance_groups GcpAuthBackendRole#bound_instance_groups}.
---
@@ -1862,7 +1862,7 @@ public java.util.List getBoundLabels();
- *Type:* java.util.List
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_labels GcpAuthBackendRole#bound_labels}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_labels GcpAuthBackendRole#bound_labels}.
---
@@ -1874,7 +1874,7 @@ public java.util.List getBoundProjects();
- *Type:* java.util.List
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_projects GcpAuthBackendRole#bound_projects}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_projects GcpAuthBackendRole#bound_projects}.
---
@@ -1886,7 +1886,7 @@ public java.util.List getBoundRegions();
- *Type:* java.util.List
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_regions GcpAuthBackendRole#bound_regions}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_regions GcpAuthBackendRole#bound_regions}.
---
@@ -1898,7 +1898,7 @@ public java.util.List getBoundServiceAccounts();
- *Type:* java.util.List
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_service_accounts GcpAuthBackendRole#bound_service_accounts}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_service_accounts GcpAuthBackendRole#bound_service_accounts}.
---
@@ -1910,7 +1910,7 @@ public java.util.List getBoundZones();
- *Type:* java.util.List
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_zones GcpAuthBackendRole#bound_zones}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_zones GcpAuthBackendRole#bound_zones}.
---
@@ -1922,7 +1922,7 @@ public java.lang.String getId();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#id GcpAuthBackendRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#id GcpAuthBackendRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1937,7 +1937,7 @@ public java.lang.String getMaxJwtExp();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#max_jwt_exp GcpAuthBackendRole#max_jwt_exp}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#max_jwt_exp GcpAuthBackendRole#max_jwt_exp}.
---
@@ -1951,7 +1951,7 @@ public java.lang.String getNamespace();
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#namespace GcpAuthBackendRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#namespace GcpAuthBackendRole#namespace}
---
@@ -1965,7 +1965,7 @@ public java.util.List getTokenBoundCidrs();
Specifies the blocks of IP addresses which are allowed to use the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_bound_cidrs GcpAuthBackendRole#token_bound_cidrs}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_bound_cidrs GcpAuthBackendRole#token_bound_cidrs}
---
@@ -1979,7 +1979,7 @@ public java.lang.Number getTokenExplicitMaxTtl();
Generated Token's Explicit Maximum TTL in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_explicit_max_ttl GcpAuthBackendRole#token_explicit_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_explicit_max_ttl GcpAuthBackendRole#token_explicit_max_ttl}
---
@@ -1993,7 +1993,7 @@ public java.lang.Number getTokenMaxTtl();
The maximum lifetime of the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_max_ttl GcpAuthBackendRole#token_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_max_ttl GcpAuthBackendRole#token_max_ttl}
---
@@ -2007,7 +2007,7 @@ public java.lang.Object getTokenNoDefaultPolicy();
If true, the 'default' policy will not automatically be added to generated tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_no_default_policy GcpAuthBackendRole#token_no_default_policy}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_no_default_policy GcpAuthBackendRole#token_no_default_policy}
---
@@ -2021,7 +2021,7 @@ public java.lang.Number getTokenNumUses();
The maximum number of times a token may be used, a value of zero means unlimited.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_num_uses GcpAuthBackendRole#token_num_uses}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_num_uses GcpAuthBackendRole#token_num_uses}
---
@@ -2035,7 +2035,7 @@ public java.lang.Number getTokenPeriod();
Generated Token's Period.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_period GcpAuthBackendRole#token_period}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_period GcpAuthBackendRole#token_period}
---
@@ -2049,7 +2049,7 @@ public java.util.List getTokenPolicies();
Generated Token's Policies.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_policies GcpAuthBackendRole#token_policies}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_policies GcpAuthBackendRole#token_policies}
---
@@ -2063,7 +2063,7 @@ public java.lang.Number getTokenTtl();
The initial ttl of the token to generate in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_ttl GcpAuthBackendRole#token_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_ttl GcpAuthBackendRole#token_ttl}
---
@@ -2077,7 +2077,7 @@ public java.lang.String getTokenType();
The type of token to generate, service or batch.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_type GcpAuthBackendRole#token_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_type GcpAuthBackendRole#token_type}
---
diff --git a/docs/gcpAuthBackendRole.python.md b/docs/gcpAuthBackendRole.python.md
index 5d01aca9..6904d351 100644
--- a/docs/gcpAuthBackendRole.python.md
+++ b/docs/gcpAuthBackendRole.python.md
@@ -4,7 +4,7 @@
### GcpAuthBackendRole
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role vault_gcp_auth_backend_role}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role vault_gcp_auth_backend_role}.
#### Initializers
@@ -58,19 +58,19 @@ gcpAuthBackendRole.GcpAuthBackendRole(
| lifecycle
| cdktf.TerraformResourceLifecycle
| *No description.* |
| provider
| cdktf.TerraformProvider
| *No description.* |
| provisioners
| typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]]
| *No description.* |
-| role
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#role GcpAuthBackendRole#role}. |
-| type
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#type GcpAuthBackendRole#type}. |
-| add_group_aliases
| typing.Union[bool, cdktf.IResolvable]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#add_group_aliases GcpAuthBackendRole#add_group_aliases}. |
-| allow_gce_inference
| typing.Union[bool, cdktf.IResolvable]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#allow_gce_inference GcpAuthBackendRole#allow_gce_inference}. |
-| backend
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#backend GcpAuthBackendRole#backend}. |
-| bound_instance_groups
| typing.List[str]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_instance_groups GcpAuthBackendRole#bound_instance_groups}. |
-| bound_labels
| typing.List[str]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_labels GcpAuthBackendRole#bound_labels}. |
-| bound_projects
| typing.List[str]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_projects GcpAuthBackendRole#bound_projects}. |
-| bound_regions
| typing.List[str]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_regions GcpAuthBackendRole#bound_regions}. |
-| bound_service_accounts
| typing.List[str]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_service_accounts GcpAuthBackendRole#bound_service_accounts}. |
-| bound_zones
| typing.List[str]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_zones GcpAuthBackendRole#bound_zones}. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#id GcpAuthBackendRole#id}. |
-| max_jwt_exp
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#max_jwt_exp GcpAuthBackendRole#max_jwt_exp}. |
+| role
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#role GcpAuthBackendRole#role}. |
+| type
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#type GcpAuthBackendRole#type}. |
+| add_group_aliases
| typing.Union[bool, cdktf.IResolvable]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#add_group_aliases GcpAuthBackendRole#add_group_aliases}. |
+| allow_gce_inference
| typing.Union[bool, cdktf.IResolvable]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#allow_gce_inference GcpAuthBackendRole#allow_gce_inference}. |
+| backend
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#backend GcpAuthBackendRole#backend}. |
+| bound_instance_groups
| typing.List[str]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_instance_groups GcpAuthBackendRole#bound_instance_groups}. |
+| bound_labels
| typing.List[str]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_labels GcpAuthBackendRole#bound_labels}. |
+| bound_projects
| typing.List[str]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_projects GcpAuthBackendRole#bound_projects}. |
+| bound_regions
| typing.List[str]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_regions GcpAuthBackendRole#bound_regions}. |
+| bound_service_accounts
| typing.List[str]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_service_accounts GcpAuthBackendRole#bound_service_accounts}. |
+| bound_zones
| typing.List[str]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_zones GcpAuthBackendRole#bound_zones}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#id GcpAuthBackendRole#id}. |
+| max_jwt_exp
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#max_jwt_exp GcpAuthBackendRole#max_jwt_exp}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
| token_bound_cidrs
| typing.List[str]
| Specifies the blocks of IP addresses which are allowed to use the generated token. |
| token_explicit_max_ttl
| typing.Union[int, float]
| Generated Token's Explicit Maximum TTL in seconds. |
@@ -148,7 +148,7 @@ Must be unique amongst siblings in the same scope
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#role GcpAuthBackendRole#role}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#role GcpAuthBackendRole#role}.
---
@@ -156,7 +156,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#type GcpAuthBackendRole#type}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#type GcpAuthBackendRole#type}.
---
@@ -164,7 +164,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* typing.Union[bool, cdktf.IResolvable]
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#add_group_aliases GcpAuthBackendRole#add_group_aliases}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#add_group_aliases GcpAuthBackendRole#add_group_aliases}.
---
@@ -172,7 +172,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* typing.Union[bool, cdktf.IResolvable]
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#allow_gce_inference GcpAuthBackendRole#allow_gce_inference}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#allow_gce_inference GcpAuthBackendRole#allow_gce_inference}.
---
@@ -180,7 +180,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#backend GcpAuthBackendRole#backend}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#backend GcpAuthBackendRole#backend}.
---
@@ -188,7 +188,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* typing.List[str]
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_instance_groups GcpAuthBackendRole#bound_instance_groups}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_instance_groups GcpAuthBackendRole#bound_instance_groups}.
---
@@ -196,7 +196,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* typing.List[str]
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_labels GcpAuthBackendRole#bound_labels}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_labels GcpAuthBackendRole#bound_labels}.
---
@@ -204,7 +204,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* typing.List[str]
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_projects GcpAuthBackendRole#bound_projects}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_projects GcpAuthBackendRole#bound_projects}.
---
@@ -212,7 +212,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* typing.List[str]
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_regions GcpAuthBackendRole#bound_regions}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_regions GcpAuthBackendRole#bound_regions}.
---
@@ -220,7 +220,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* typing.List[str]
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_service_accounts GcpAuthBackendRole#bound_service_accounts}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_service_accounts GcpAuthBackendRole#bound_service_accounts}.
---
@@ -228,7 +228,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* typing.List[str]
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_zones GcpAuthBackendRole#bound_zones}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_zones GcpAuthBackendRole#bound_zones}.
---
@@ -236,7 +236,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#id GcpAuthBackendRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#id GcpAuthBackendRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -247,7 +247,7 @@ If you experience problems setting this value it might not be settable. Please t
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#max_jwt_exp GcpAuthBackendRole#max_jwt_exp}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#max_jwt_exp GcpAuthBackendRole#max_jwt_exp}.
---
@@ -257,7 +257,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#namespace GcpAuthBackendRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#namespace GcpAuthBackendRole#namespace}
---
@@ -267,7 +267,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Specifies the blocks of IP addresses which are allowed to use the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_bound_cidrs GcpAuthBackendRole#token_bound_cidrs}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_bound_cidrs GcpAuthBackendRole#token_bound_cidrs}
---
@@ -277,7 +277,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Generated Token's Explicit Maximum TTL in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_explicit_max_ttl GcpAuthBackendRole#token_explicit_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_explicit_max_ttl GcpAuthBackendRole#token_explicit_max_ttl}
---
@@ -287,7 +287,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The maximum lifetime of the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_max_ttl GcpAuthBackendRole#token_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_max_ttl GcpAuthBackendRole#token_max_ttl}
---
@@ -297,7 +297,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
If true, the 'default' policy will not automatically be added to generated tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_no_default_policy GcpAuthBackendRole#token_no_default_policy}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_no_default_policy GcpAuthBackendRole#token_no_default_policy}
---
@@ -307,7 +307,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The maximum number of times a token may be used, a value of zero means unlimited.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_num_uses GcpAuthBackendRole#token_num_uses}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_num_uses GcpAuthBackendRole#token_num_uses}
---
@@ -317,7 +317,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Generated Token's Period.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_period GcpAuthBackendRole#token_period}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_period GcpAuthBackendRole#token_period}
---
@@ -327,7 +327,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Generated Token's Policies.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_policies GcpAuthBackendRole#token_policies}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_policies GcpAuthBackendRole#token_policies}
---
@@ -337,7 +337,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The initial ttl of the token to generate in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_ttl GcpAuthBackendRole#token_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_ttl GcpAuthBackendRole#token_ttl}
---
@@ -347,7 +347,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The type of token to generate, service or batch.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_type GcpAuthBackendRole#token_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_type GcpAuthBackendRole#token_type}
---
@@ -967,7 +967,7 @@ The construct id used in the generated config for the GcpAuthBackendRole to impo
The id of the existing GcpAuthBackendRole that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#import import section} in the documentation of this resource for the id to use
---
@@ -1720,19 +1720,19 @@ gcpAuthBackendRole.GcpAuthBackendRoleConfig(
| lifecycle
| cdktf.TerraformResourceLifecycle
| *No description.* |
| provider
| cdktf.TerraformProvider
| *No description.* |
| provisioners
| typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]]
| *No description.* |
-| role
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#role GcpAuthBackendRole#role}. |
-| type
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#type GcpAuthBackendRole#type}. |
-| add_group_aliases
| typing.Union[bool, cdktf.IResolvable]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#add_group_aliases GcpAuthBackendRole#add_group_aliases}. |
-| allow_gce_inference
| typing.Union[bool, cdktf.IResolvable]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#allow_gce_inference GcpAuthBackendRole#allow_gce_inference}. |
-| backend
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#backend GcpAuthBackendRole#backend}. |
-| bound_instance_groups
| typing.List[str]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_instance_groups GcpAuthBackendRole#bound_instance_groups}. |
-| bound_labels
| typing.List[str]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_labels GcpAuthBackendRole#bound_labels}. |
-| bound_projects
| typing.List[str]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_projects GcpAuthBackendRole#bound_projects}. |
-| bound_regions
| typing.List[str]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_regions GcpAuthBackendRole#bound_regions}. |
-| bound_service_accounts
| typing.List[str]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_service_accounts GcpAuthBackendRole#bound_service_accounts}. |
-| bound_zones
| typing.List[str]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_zones GcpAuthBackendRole#bound_zones}. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#id GcpAuthBackendRole#id}. |
-| max_jwt_exp
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#max_jwt_exp GcpAuthBackendRole#max_jwt_exp}. |
+| role
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#role GcpAuthBackendRole#role}. |
+| type
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#type GcpAuthBackendRole#type}. |
+| add_group_aliases
| typing.Union[bool, cdktf.IResolvable]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#add_group_aliases GcpAuthBackendRole#add_group_aliases}. |
+| allow_gce_inference
| typing.Union[bool, cdktf.IResolvable]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#allow_gce_inference GcpAuthBackendRole#allow_gce_inference}. |
+| backend
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#backend GcpAuthBackendRole#backend}. |
+| bound_instance_groups
| typing.List[str]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_instance_groups GcpAuthBackendRole#bound_instance_groups}. |
+| bound_labels
| typing.List[str]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_labels GcpAuthBackendRole#bound_labels}. |
+| bound_projects
| typing.List[str]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_projects GcpAuthBackendRole#bound_projects}. |
+| bound_regions
| typing.List[str]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_regions GcpAuthBackendRole#bound_regions}. |
+| bound_service_accounts
| typing.List[str]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_service_accounts GcpAuthBackendRole#bound_service_accounts}. |
+| bound_zones
| typing.List[str]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_zones GcpAuthBackendRole#bound_zones}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#id GcpAuthBackendRole#id}. |
+| max_jwt_exp
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#max_jwt_exp GcpAuthBackendRole#max_jwt_exp}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
| token_bound_cidrs
| typing.List[str]
| Specifies the blocks of IP addresses which are allowed to use the generated token. |
| token_explicit_max_ttl
| typing.Union[int, float]
| Generated Token's Explicit Maximum TTL in seconds. |
@@ -1824,7 +1824,7 @@ role: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#role GcpAuthBackendRole#role}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#role GcpAuthBackendRole#role}.
---
@@ -1836,7 +1836,7 @@ type: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#type GcpAuthBackendRole#type}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#type GcpAuthBackendRole#type}.
---
@@ -1848,7 +1848,7 @@ add_group_aliases: typing.Union[bool, IResolvable]
- *Type:* typing.Union[bool, cdktf.IResolvable]
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#add_group_aliases GcpAuthBackendRole#add_group_aliases}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#add_group_aliases GcpAuthBackendRole#add_group_aliases}.
---
@@ -1860,7 +1860,7 @@ allow_gce_inference: typing.Union[bool, IResolvable]
- *Type:* typing.Union[bool, cdktf.IResolvable]
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#allow_gce_inference GcpAuthBackendRole#allow_gce_inference}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#allow_gce_inference GcpAuthBackendRole#allow_gce_inference}.
---
@@ -1872,7 +1872,7 @@ backend: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#backend GcpAuthBackendRole#backend}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#backend GcpAuthBackendRole#backend}.
---
@@ -1884,7 +1884,7 @@ bound_instance_groups: typing.List[str]
- *Type:* typing.List[str]
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_instance_groups GcpAuthBackendRole#bound_instance_groups}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_instance_groups GcpAuthBackendRole#bound_instance_groups}.
---
@@ -1896,7 +1896,7 @@ bound_labels: typing.List[str]
- *Type:* typing.List[str]
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_labels GcpAuthBackendRole#bound_labels}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_labels GcpAuthBackendRole#bound_labels}.
---
@@ -1908,7 +1908,7 @@ bound_projects: typing.List[str]
- *Type:* typing.List[str]
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_projects GcpAuthBackendRole#bound_projects}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_projects GcpAuthBackendRole#bound_projects}.
---
@@ -1920,7 +1920,7 @@ bound_regions: typing.List[str]
- *Type:* typing.List[str]
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_regions GcpAuthBackendRole#bound_regions}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_regions GcpAuthBackendRole#bound_regions}.
---
@@ -1932,7 +1932,7 @@ bound_service_accounts: typing.List[str]
- *Type:* typing.List[str]
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_service_accounts GcpAuthBackendRole#bound_service_accounts}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_service_accounts GcpAuthBackendRole#bound_service_accounts}.
---
@@ -1944,7 +1944,7 @@ bound_zones: typing.List[str]
- *Type:* typing.List[str]
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_zones GcpAuthBackendRole#bound_zones}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_zones GcpAuthBackendRole#bound_zones}.
---
@@ -1956,7 +1956,7 @@ id: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#id GcpAuthBackendRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#id GcpAuthBackendRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1971,7 +1971,7 @@ max_jwt_exp: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#max_jwt_exp GcpAuthBackendRole#max_jwt_exp}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#max_jwt_exp GcpAuthBackendRole#max_jwt_exp}.
---
@@ -1985,7 +1985,7 @@ namespace: str
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#namespace GcpAuthBackendRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#namespace GcpAuthBackendRole#namespace}
---
@@ -1999,7 +1999,7 @@ token_bound_cidrs: typing.List[str]
Specifies the blocks of IP addresses which are allowed to use the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_bound_cidrs GcpAuthBackendRole#token_bound_cidrs}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_bound_cidrs GcpAuthBackendRole#token_bound_cidrs}
---
@@ -2013,7 +2013,7 @@ token_explicit_max_ttl: typing.Union[int, float]
Generated Token's Explicit Maximum TTL in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_explicit_max_ttl GcpAuthBackendRole#token_explicit_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_explicit_max_ttl GcpAuthBackendRole#token_explicit_max_ttl}
---
@@ -2027,7 +2027,7 @@ token_max_ttl: typing.Union[int, float]
The maximum lifetime of the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_max_ttl GcpAuthBackendRole#token_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_max_ttl GcpAuthBackendRole#token_max_ttl}
---
@@ -2041,7 +2041,7 @@ token_no_default_policy: typing.Union[bool, IResolvable]
If true, the 'default' policy will not automatically be added to generated tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_no_default_policy GcpAuthBackendRole#token_no_default_policy}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_no_default_policy GcpAuthBackendRole#token_no_default_policy}
---
@@ -2055,7 +2055,7 @@ token_num_uses: typing.Union[int, float]
The maximum number of times a token may be used, a value of zero means unlimited.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_num_uses GcpAuthBackendRole#token_num_uses}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_num_uses GcpAuthBackendRole#token_num_uses}
---
@@ -2069,7 +2069,7 @@ token_period: typing.Union[int, float]
Generated Token's Period.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_period GcpAuthBackendRole#token_period}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_period GcpAuthBackendRole#token_period}
---
@@ -2083,7 +2083,7 @@ token_policies: typing.List[str]
Generated Token's Policies.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_policies GcpAuthBackendRole#token_policies}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_policies GcpAuthBackendRole#token_policies}
---
@@ -2097,7 +2097,7 @@ token_ttl: typing.Union[int, float]
The initial ttl of the token to generate in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_ttl GcpAuthBackendRole#token_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_ttl GcpAuthBackendRole#token_ttl}
---
@@ -2111,7 +2111,7 @@ token_type: str
The type of token to generate, service or batch.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_type GcpAuthBackendRole#token_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_type GcpAuthBackendRole#token_type}
---
diff --git a/docs/gcpAuthBackendRole.typescript.md b/docs/gcpAuthBackendRole.typescript.md
index 2165fa29..fb6398e0 100644
--- a/docs/gcpAuthBackendRole.typescript.md
+++ b/docs/gcpAuthBackendRole.typescript.md
@@ -4,7 +4,7 @@
### GcpAuthBackendRole
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role vault_gcp_auth_backend_role}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role vault_gcp_auth_backend_role}.
#### Initializers
@@ -614,7 +614,7 @@ The construct id used in the generated config for the GcpAuthBackendRole to impo
The id of the existing GcpAuthBackendRole that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#import import section} in the documentation of this resource for the id to use
---
@@ -1336,19 +1336,19 @@ const gcpAuthBackendRoleConfig: gcpAuthBackendRole.GcpAuthBackendRoleConfig = {
| lifecycle
| cdktf.TerraformResourceLifecycle
| *No description.* |
| provider
| cdktf.TerraformProvider
| *No description.* |
| provisioners
| cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[]
| *No description.* |
-| role
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#role GcpAuthBackendRole#role}. |
-| type
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#type GcpAuthBackendRole#type}. |
-| addGroupAliases
| boolean \| cdktf.IResolvable
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#add_group_aliases GcpAuthBackendRole#add_group_aliases}. |
-| allowGceInference
| boolean \| cdktf.IResolvable
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#allow_gce_inference GcpAuthBackendRole#allow_gce_inference}. |
-| backend
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#backend GcpAuthBackendRole#backend}. |
-| boundInstanceGroups
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_instance_groups GcpAuthBackendRole#bound_instance_groups}. |
-| boundLabels
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_labels GcpAuthBackendRole#bound_labels}. |
-| boundProjects
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_projects GcpAuthBackendRole#bound_projects}. |
-| boundRegions
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_regions GcpAuthBackendRole#bound_regions}. |
-| boundServiceAccounts
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_service_accounts GcpAuthBackendRole#bound_service_accounts}. |
-| boundZones
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_zones GcpAuthBackendRole#bound_zones}. |
-| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#id GcpAuthBackendRole#id}. |
-| maxJwtExp
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#max_jwt_exp GcpAuthBackendRole#max_jwt_exp}. |
+| role
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#role GcpAuthBackendRole#role}. |
+| type
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#type GcpAuthBackendRole#type}. |
+| addGroupAliases
| boolean \| cdktf.IResolvable
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#add_group_aliases GcpAuthBackendRole#add_group_aliases}. |
+| allowGceInference
| boolean \| cdktf.IResolvable
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#allow_gce_inference GcpAuthBackendRole#allow_gce_inference}. |
+| backend
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#backend GcpAuthBackendRole#backend}. |
+| boundInstanceGroups
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_instance_groups GcpAuthBackendRole#bound_instance_groups}. |
+| boundLabels
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_labels GcpAuthBackendRole#bound_labels}. |
+| boundProjects
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_projects GcpAuthBackendRole#bound_projects}. |
+| boundRegions
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_regions GcpAuthBackendRole#bound_regions}. |
+| boundServiceAccounts
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_service_accounts GcpAuthBackendRole#bound_service_accounts}. |
+| boundZones
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_zones GcpAuthBackendRole#bound_zones}. |
+| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#id GcpAuthBackendRole#id}. |
+| maxJwtExp
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#max_jwt_exp GcpAuthBackendRole#max_jwt_exp}. |
| namespace
| string
| Target namespace. (requires Enterprise). |
| tokenBoundCidrs
| string[]
| Specifies the blocks of IP addresses which are allowed to use the generated token. |
| tokenExplicitMaxTtl
| number
| Generated Token's Explicit Maximum TTL in seconds. |
@@ -1440,7 +1440,7 @@ public readonly role: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#role GcpAuthBackendRole#role}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#role GcpAuthBackendRole#role}.
---
@@ -1452,7 +1452,7 @@ public readonly type: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#type GcpAuthBackendRole#type}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#type GcpAuthBackendRole#type}.
---
@@ -1464,7 +1464,7 @@ public readonly addGroupAliases: boolean | IResolvable;
- *Type:* boolean | cdktf.IResolvable
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#add_group_aliases GcpAuthBackendRole#add_group_aliases}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#add_group_aliases GcpAuthBackendRole#add_group_aliases}.
---
@@ -1476,7 +1476,7 @@ public readonly allowGceInference: boolean | IResolvable;
- *Type:* boolean | cdktf.IResolvable
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#allow_gce_inference GcpAuthBackendRole#allow_gce_inference}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#allow_gce_inference GcpAuthBackendRole#allow_gce_inference}.
---
@@ -1488,7 +1488,7 @@ public readonly backend: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#backend GcpAuthBackendRole#backend}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#backend GcpAuthBackendRole#backend}.
---
@@ -1500,7 +1500,7 @@ public readonly boundInstanceGroups: string[];
- *Type:* string[]
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_instance_groups GcpAuthBackendRole#bound_instance_groups}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_instance_groups GcpAuthBackendRole#bound_instance_groups}.
---
@@ -1512,7 +1512,7 @@ public readonly boundLabels: string[];
- *Type:* string[]
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_labels GcpAuthBackendRole#bound_labels}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_labels GcpAuthBackendRole#bound_labels}.
---
@@ -1524,7 +1524,7 @@ public readonly boundProjects: string[];
- *Type:* string[]
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_projects GcpAuthBackendRole#bound_projects}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_projects GcpAuthBackendRole#bound_projects}.
---
@@ -1536,7 +1536,7 @@ public readonly boundRegions: string[];
- *Type:* string[]
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_regions GcpAuthBackendRole#bound_regions}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_regions GcpAuthBackendRole#bound_regions}.
---
@@ -1548,7 +1548,7 @@ public readonly boundServiceAccounts: string[];
- *Type:* string[]
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_service_accounts GcpAuthBackendRole#bound_service_accounts}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_service_accounts GcpAuthBackendRole#bound_service_accounts}.
---
@@ -1560,7 +1560,7 @@ public readonly boundZones: string[];
- *Type:* string[]
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_zones GcpAuthBackendRole#bound_zones}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_zones GcpAuthBackendRole#bound_zones}.
---
@@ -1572,7 +1572,7 @@ public readonly id: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#id GcpAuthBackendRole#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#id GcpAuthBackendRole#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1587,7 +1587,7 @@ public readonly maxJwtExp: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#max_jwt_exp GcpAuthBackendRole#max_jwt_exp}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#max_jwt_exp GcpAuthBackendRole#max_jwt_exp}.
---
@@ -1601,7 +1601,7 @@ public readonly namespace: string;
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#namespace GcpAuthBackendRole#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#namespace GcpAuthBackendRole#namespace}
---
@@ -1615,7 +1615,7 @@ public readonly tokenBoundCidrs: string[];
Specifies the blocks of IP addresses which are allowed to use the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_bound_cidrs GcpAuthBackendRole#token_bound_cidrs}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_bound_cidrs GcpAuthBackendRole#token_bound_cidrs}
---
@@ -1629,7 +1629,7 @@ public readonly tokenExplicitMaxTtl: number;
Generated Token's Explicit Maximum TTL in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_explicit_max_ttl GcpAuthBackendRole#token_explicit_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_explicit_max_ttl GcpAuthBackendRole#token_explicit_max_ttl}
---
@@ -1643,7 +1643,7 @@ public readonly tokenMaxTtl: number;
The maximum lifetime of the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_max_ttl GcpAuthBackendRole#token_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_max_ttl GcpAuthBackendRole#token_max_ttl}
---
@@ -1657,7 +1657,7 @@ public readonly tokenNoDefaultPolicy: boolean | IResolvable;
If true, the 'default' policy will not automatically be added to generated tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_no_default_policy GcpAuthBackendRole#token_no_default_policy}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_no_default_policy GcpAuthBackendRole#token_no_default_policy}
---
@@ -1671,7 +1671,7 @@ public readonly tokenNumUses: number;
The maximum number of times a token may be used, a value of zero means unlimited.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_num_uses GcpAuthBackendRole#token_num_uses}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_num_uses GcpAuthBackendRole#token_num_uses}
---
@@ -1685,7 +1685,7 @@ public readonly tokenPeriod: number;
Generated Token's Period.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_period GcpAuthBackendRole#token_period}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_period GcpAuthBackendRole#token_period}
---
@@ -1699,7 +1699,7 @@ public readonly tokenPolicies: string[];
Generated Token's Policies.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_policies GcpAuthBackendRole#token_policies}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_policies GcpAuthBackendRole#token_policies}
---
@@ -1713,7 +1713,7 @@ public readonly tokenTtl: number;
The initial ttl of the token to generate in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_ttl GcpAuthBackendRole#token_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_ttl GcpAuthBackendRole#token_ttl}
---
@@ -1727,7 +1727,7 @@ public readonly tokenType: string;
The type of token to generate, service or batch.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_type GcpAuthBackendRole#token_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_type GcpAuthBackendRole#token_type}
---
diff --git a/docs/gcpSecretBackend.csharp.md b/docs/gcpSecretBackend.csharp.md
index d18b8c06..0a78eb91 100644
--- a/docs/gcpSecretBackend.csharp.md
+++ b/docs/gcpSecretBackend.csharp.md
@@ -4,7 +4,7 @@
### GcpSecretBackend
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend vault_gcp_secret_backend}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend vault_gcp_secret_backend}.
#### Initializers
@@ -558,7 +558,7 @@ The construct id used in the generated config for the GcpSecretBackend to import
The id of the existing GcpSecretBackend that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#import import section} in the documentation of this resource for the id to use
---
@@ -1096,7 +1096,7 @@ new GcpSecretBackendConfig {
| DefaultLeaseTtlSeconds
| double
| Default lease duration for secrets in seconds. |
| Description
| string
| Human-friendly description of the mount for the backend. |
| DisableRemount
| object
| If set, opts out of mount migration on path updates. |
-| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#id GcpSecretBackend#id}. |
+| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#id GcpSecretBackend#id}. |
| IdentityTokenAudience
| string
| The audience claim value for plugin identity tokens. |
| IdentityTokenKey
| string
| The key to use for signing identity tokens. |
| IdentityTokenTtl
| double
| The TTL of generated tokens. |
@@ -1188,7 +1188,7 @@ public string Credentials { get; set; }
JSON-encoded credentials to use to connect to GCP.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#credentials GcpSecretBackend#credentials}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#credentials GcpSecretBackend#credentials}
---
@@ -1202,7 +1202,7 @@ public double DefaultLeaseTtlSeconds { get; set; }
Default lease duration for secrets in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#default_lease_ttl_seconds GcpSecretBackend#default_lease_ttl_seconds}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#default_lease_ttl_seconds GcpSecretBackend#default_lease_ttl_seconds}
---
@@ -1216,7 +1216,7 @@ public string Description { get; set; }
Human-friendly description of the mount for the backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#description GcpSecretBackend#description}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#description GcpSecretBackend#description}
---
@@ -1230,7 +1230,7 @@ public object DisableRemount { get; set; }
If set, opts out of mount migration on path updates.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#disable_remount GcpSecretBackend#disable_remount}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#disable_remount GcpSecretBackend#disable_remount}
---
@@ -1242,7 +1242,7 @@ public string Id { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#id GcpSecretBackend#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#id GcpSecretBackend#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1259,7 +1259,7 @@ public string IdentityTokenAudience { get; set; }
The audience claim value for plugin identity tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#identity_token_audience GcpSecretBackend#identity_token_audience}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#identity_token_audience GcpSecretBackend#identity_token_audience}
---
@@ -1273,7 +1273,7 @@ public string IdentityTokenKey { get; set; }
The key to use for signing identity tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#identity_token_key GcpSecretBackend#identity_token_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#identity_token_key GcpSecretBackend#identity_token_key}
---
@@ -1287,7 +1287,7 @@ public double IdentityTokenTtl { get; set; }
The TTL of generated tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#identity_token_ttl GcpSecretBackend#identity_token_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#identity_token_ttl GcpSecretBackend#identity_token_ttl}
---
@@ -1301,7 +1301,7 @@ public object Local { get; set; }
Local mount flag that can be explicitly set to true to enforce local mount in HA environment.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#local GcpSecretBackend#local}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#local GcpSecretBackend#local}
---
@@ -1315,7 +1315,7 @@ public double MaxLeaseTtlSeconds { get; set; }
Maximum possible lease duration for secrets in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#max_lease_ttl_seconds GcpSecretBackend#max_lease_ttl_seconds}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#max_lease_ttl_seconds GcpSecretBackend#max_lease_ttl_seconds}
---
@@ -1329,7 +1329,7 @@ public string Namespace { get; set; }
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#namespace GcpSecretBackend#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#namespace GcpSecretBackend#namespace}
---
@@ -1343,7 +1343,7 @@ public string Path { get; set; }
Path to mount the backend at.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#path GcpSecretBackend#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#path GcpSecretBackend#path}
---
@@ -1357,7 +1357,7 @@ public string ServiceAccountEmail { get; set; }
Service Account to impersonate for plugin workload identity federation.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#service_account_email GcpSecretBackend#service_account_email}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#service_account_email GcpSecretBackend#service_account_email}
---
diff --git a/docs/gcpSecretBackend.go.md b/docs/gcpSecretBackend.go.md
index ac4388fb..0d1f31da 100644
--- a/docs/gcpSecretBackend.go.md
+++ b/docs/gcpSecretBackend.go.md
@@ -4,7 +4,7 @@
### GcpSecretBackend
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend vault_gcp_secret_backend}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend vault_gcp_secret_backend}.
#### Initializers
@@ -558,7 +558,7 @@ The construct id used in the generated config for the GcpSecretBackend to import
The id of the existing GcpSecretBackend that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#import import section} in the documentation of this resource for the id to use
---
@@ -1096,7 +1096,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/gcpsecretbackend"
| DefaultLeaseTtlSeconds
| *f64
| Default lease duration for secrets in seconds. |
| Description
| *string
| Human-friendly description of the mount for the backend. |
| DisableRemount
| interface{}
| If set, opts out of mount migration on path updates. |
-| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#id GcpSecretBackend#id}. |
+| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#id GcpSecretBackend#id}. |
| IdentityTokenAudience
| *string
| The audience claim value for plugin identity tokens. |
| IdentityTokenKey
| *string
| The key to use for signing identity tokens. |
| IdentityTokenTtl
| *f64
| The TTL of generated tokens. |
@@ -1188,7 +1188,7 @@ Credentials *string
JSON-encoded credentials to use to connect to GCP.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#credentials GcpSecretBackend#credentials}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#credentials GcpSecretBackend#credentials}
---
@@ -1202,7 +1202,7 @@ DefaultLeaseTtlSeconds *f64
Default lease duration for secrets in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#default_lease_ttl_seconds GcpSecretBackend#default_lease_ttl_seconds}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#default_lease_ttl_seconds GcpSecretBackend#default_lease_ttl_seconds}
---
@@ -1216,7 +1216,7 @@ Description *string
Human-friendly description of the mount for the backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#description GcpSecretBackend#description}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#description GcpSecretBackend#description}
---
@@ -1230,7 +1230,7 @@ DisableRemount interface{}
If set, opts out of mount migration on path updates.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#disable_remount GcpSecretBackend#disable_remount}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#disable_remount GcpSecretBackend#disable_remount}
---
@@ -1242,7 +1242,7 @@ Id *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#id GcpSecretBackend#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#id GcpSecretBackend#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1259,7 +1259,7 @@ IdentityTokenAudience *string
The audience claim value for plugin identity tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#identity_token_audience GcpSecretBackend#identity_token_audience}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#identity_token_audience GcpSecretBackend#identity_token_audience}
---
@@ -1273,7 +1273,7 @@ IdentityTokenKey *string
The key to use for signing identity tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#identity_token_key GcpSecretBackend#identity_token_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#identity_token_key GcpSecretBackend#identity_token_key}
---
@@ -1287,7 +1287,7 @@ IdentityTokenTtl *f64
The TTL of generated tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#identity_token_ttl GcpSecretBackend#identity_token_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#identity_token_ttl GcpSecretBackend#identity_token_ttl}
---
@@ -1301,7 +1301,7 @@ Local interface{}
Local mount flag that can be explicitly set to true to enforce local mount in HA environment.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#local GcpSecretBackend#local}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#local GcpSecretBackend#local}
---
@@ -1315,7 +1315,7 @@ MaxLeaseTtlSeconds *f64
Maximum possible lease duration for secrets in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#max_lease_ttl_seconds GcpSecretBackend#max_lease_ttl_seconds}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#max_lease_ttl_seconds GcpSecretBackend#max_lease_ttl_seconds}
---
@@ -1329,7 +1329,7 @@ Namespace *string
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#namespace GcpSecretBackend#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#namespace GcpSecretBackend#namespace}
---
@@ -1343,7 +1343,7 @@ Path *string
Path to mount the backend at.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#path GcpSecretBackend#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#path GcpSecretBackend#path}
---
@@ -1357,7 +1357,7 @@ ServiceAccountEmail *string
Service Account to impersonate for plugin workload identity federation.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#service_account_email GcpSecretBackend#service_account_email}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#service_account_email GcpSecretBackend#service_account_email}
---
diff --git a/docs/gcpSecretBackend.java.md b/docs/gcpSecretBackend.java.md
index 14b6a2f7..e7bbc7c6 100644
--- a/docs/gcpSecretBackend.java.md
+++ b/docs/gcpSecretBackend.java.md
@@ -4,7 +4,7 @@
### GcpSecretBackend
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend vault_gcp_secret_backend}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend vault_gcp_secret_backend}.
#### Initializers
@@ -56,7 +56,7 @@ GcpSecretBackend.Builder.create(Construct scope, java.lang.String id)
| defaultLeaseTtlSeconds
| java.lang.Number
| Default lease duration for secrets in seconds. |
| description
| java.lang.String
| Human-friendly description of the mount for the backend. |
| disableRemount
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| If set, opts out of mount migration on path updates. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#id GcpSecretBackend#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#id GcpSecretBackend#id}. |
| identityTokenAudience
| java.lang.String
| The audience claim value for plugin identity tokens. |
| identityTokenKey
| java.lang.String
| The key to use for signing identity tokens. |
| identityTokenTtl
| java.lang.Number
| The TTL of generated tokens. |
@@ -134,7 +134,7 @@ Must be unique amongst siblings in the same scope
JSON-encoded credentials to use to connect to GCP.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#credentials GcpSecretBackend#credentials}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#credentials GcpSecretBackend#credentials}
---
@@ -144,7 +144,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Default lease duration for secrets in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#default_lease_ttl_seconds GcpSecretBackend#default_lease_ttl_seconds}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#default_lease_ttl_seconds GcpSecretBackend#default_lease_ttl_seconds}
---
@@ -154,7 +154,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Human-friendly description of the mount for the backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#description GcpSecretBackend#description}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#description GcpSecretBackend#description}
---
@@ -164,7 +164,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
If set, opts out of mount migration on path updates.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#disable_remount GcpSecretBackend#disable_remount}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#disable_remount GcpSecretBackend#disable_remount}
---
@@ -172,7 +172,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#id GcpSecretBackend#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#id GcpSecretBackend#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -185,7 +185,7 @@ If you experience problems setting this value it might not be settable. Please t
The audience claim value for plugin identity tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#identity_token_audience GcpSecretBackend#identity_token_audience}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#identity_token_audience GcpSecretBackend#identity_token_audience}
---
@@ -195,7 +195,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The key to use for signing identity tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#identity_token_key GcpSecretBackend#identity_token_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#identity_token_key GcpSecretBackend#identity_token_key}
---
@@ -205,7 +205,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The TTL of generated tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#identity_token_ttl GcpSecretBackend#identity_token_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#identity_token_ttl GcpSecretBackend#identity_token_ttl}
---
@@ -215,7 +215,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Local mount flag that can be explicitly set to true to enforce local mount in HA environment.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#local GcpSecretBackend#local}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#local GcpSecretBackend#local}
---
@@ -225,7 +225,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Maximum possible lease duration for secrets in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#max_lease_ttl_seconds GcpSecretBackend#max_lease_ttl_seconds}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#max_lease_ttl_seconds GcpSecretBackend#max_lease_ttl_seconds}
---
@@ -235,7 +235,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#namespace GcpSecretBackend#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#namespace GcpSecretBackend#namespace}
---
@@ -245,7 +245,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Path to mount the backend at.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#path GcpSecretBackend#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#path GcpSecretBackend#path}
---
@@ -255,7 +255,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Service Account to impersonate for plugin workload identity federation.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#service_account_email GcpSecretBackend#service_account_email}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#service_account_email GcpSecretBackend#service_account_email}
---
@@ -773,7 +773,7 @@ The construct id used in the generated config for the GcpSecretBackend to import
The id of the existing GcpSecretBackend that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#import import section} in the documentation of this resource for the id to use
---
@@ -1317,7 +1317,7 @@ GcpSecretBackendConfig.builder()
| defaultLeaseTtlSeconds
| java.lang.Number
| Default lease duration for secrets in seconds. |
| description
| java.lang.String
| Human-friendly description of the mount for the backend. |
| disableRemount
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| If set, opts out of mount migration on path updates. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#id GcpSecretBackend#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#id GcpSecretBackend#id}. |
| identityTokenAudience
| java.lang.String
| The audience claim value for plugin identity tokens. |
| identityTokenKey
| java.lang.String
| The key to use for signing identity tokens. |
| identityTokenTtl
| java.lang.Number
| The TTL of generated tokens. |
@@ -1409,7 +1409,7 @@ public java.lang.String getCredentials();
JSON-encoded credentials to use to connect to GCP.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#credentials GcpSecretBackend#credentials}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#credentials GcpSecretBackend#credentials}
---
@@ -1423,7 +1423,7 @@ public java.lang.Number getDefaultLeaseTtlSeconds();
Default lease duration for secrets in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#default_lease_ttl_seconds GcpSecretBackend#default_lease_ttl_seconds}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#default_lease_ttl_seconds GcpSecretBackend#default_lease_ttl_seconds}
---
@@ -1437,7 +1437,7 @@ public java.lang.String getDescription();
Human-friendly description of the mount for the backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#description GcpSecretBackend#description}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#description GcpSecretBackend#description}
---
@@ -1451,7 +1451,7 @@ public java.lang.Object getDisableRemount();
If set, opts out of mount migration on path updates.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#disable_remount GcpSecretBackend#disable_remount}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#disable_remount GcpSecretBackend#disable_remount}
---
@@ -1463,7 +1463,7 @@ public java.lang.String getId();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#id GcpSecretBackend#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#id GcpSecretBackend#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1480,7 +1480,7 @@ public java.lang.String getIdentityTokenAudience();
The audience claim value for plugin identity tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#identity_token_audience GcpSecretBackend#identity_token_audience}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#identity_token_audience GcpSecretBackend#identity_token_audience}
---
@@ -1494,7 +1494,7 @@ public java.lang.String getIdentityTokenKey();
The key to use for signing identity tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#identity_token_key GcpSecretBackend#identity_token_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#identity_token_key GcpSecretBackend#identity_token_key}
---
@@ -1508,7 +1508,7 @@ public java.lang.Number getIdentityTokenTtl();
The TTL of generated tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#identity_token_ttl GcpSecretBackend#identity_token_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#identity_token_ttl GcpSecretBackend#identity_token_ttl}
---
@@ -1522,7 +1522,7 @@ public java.lang.Object getLocal();
Local mount flag that can be explicitly set to true to enforce local mount in HA environment.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#local GcpSecretBackend#local}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#local GcpSecretBackend#local}
---
@@ -1536,7 +1536,7 @@ public java.lang.Number getMaxLeaseTtlSeconds();
Maximum possible lease duration for secrets in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#max_lease_ttl_seconds GcpSecretBackend#max_lease_ttl_seconds}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#max_lease_ttl_seconds GcpSecretBackend#max_lease_ttl_seconds}
---
@@ -1550,7 +1550,7 @@ public java.lang.String getNamespace();
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#namespace GcpSecretBackend#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#namespace GcpSecretBackend#namespace}
---
@@ -1564,7 +1564,7 @@ public java.lang.String getPath();
Path to mount the backend at.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#path GcpSecretBackend#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#path GcpSecretBackend#path}
---
@@ -1578,7 +1578,7 @@ public java.lang.String getServiceAccountEmail();
Service Account to impersonate for plugin workload identity federation.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#service_account_email GcpSecretBackend#service_account_email}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#service_account_email GcpSecretBackend#service_account_email}
---
diff --git a/docs/gcpSecretBackend.python.md b/docs/gcpSecretBackend.python.md
index b82a281a..77cfade4 100644
--- a/docs/gcpSecretBackend.python.md
+++ b/docs/gcpSecretBackend.python.md
@@ -4,7 +4,7 @@
### GcpSecretBackend
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend vault_gcp_secret_backend}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend vault_gcp_secret_backend}.
#### Initializers
@@ -52,7 +52,7 @@ gcpSecretBackend.GcpSecretBackend(
| default_lease_ttl_seconds
| typing.Union[int, float]
| Default lease duration for secrets in seconds. |
| description
| str
| Human-friendly description of the mount for the backend. |
| disable_remount
| typing.Union[bool, cdktf.IResolvable]
| If set, opts out of mount migration on path updates. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#id GcpSecretBackend#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#id GcpSecretBackend#id}. |
| identity_token_audience
| str
| The audience claim value for plugin identity tokens. |
| identity_token_key
| str
| The key to use for signing identity tokens. |
| identity_token_ttl
| typing.Union[int, float]
| The TTL of generated tokens. |
@@ -130,7 +130,7 @@ Must be unique amongst siblings in the same scope
JSON-encoded credentials to use to connect to GCP.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#credentials GcpSecretBackend#credentials}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#credentials GcpSecretBackend#credentials}
---
@@ -140,7 +140,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Default lease duration for secrets in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#default_lease_ttl_seconds GcpSecretBackend#default_lease_ttl_seconds}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#default_lease_ttl_seconds GcpSecretBackend#default_lease_ttl_seconds}
---
@@ -150,7 +150,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Human-friendly description of the mount for the backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#description GcpSecretBackend#description}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#description GcpSecretBackend#description}
---
@@ -160,7 +160,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
If set, opts out of mount migration on path updates.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#disable_remount GcpSecretBackend#disable_remount}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#disable_remount GcpSecretBackend#disable_remount}
---
@@ -168,7 +168,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#id GcpSecretBackend#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#id GcpSecretBackend#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -181,7 +181,7 @@ If you experience problems setting this value it might not be settable. Please t
The audience claim value for plugin identity tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#identity_token_audience GcpSecretBackend#identity_token_audience}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#identity_token_audience GcpSecretBackend#identity_token_audience}
---
@@ -191,7 +191,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The key to use for signing identity tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#identity_token_key GcpSecretBackend#identity_token_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#identity_token_key GcpSecretBackend#identity_token_key}
---
@@ -201,7 +201,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The TTL of generated tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#identity_token_ttl GcpSecretBackend#identity_token_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#identity_token_ttl GcpSecretBackend#identity_token_ttl}
---
@@ -211,7 +211,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Local mount flag that can be explicitly set to true to enforce local mount in HA environment.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#local GcpSecretBackend#local}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#local GcpSecretBackend#local}
---
@@ -221,7 +221,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Maximum possible lease duration for secrets in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#max_lease_ttl_seconds GcpSecretBackend#max_lease_ttl_seconds}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#max_lease_ttl_seconds GcpSecretBackend#max_lease_ttl_seconds}
---
@@ -231,7 +231,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#namespace GcpSecretBackend#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#namespace GcpSecretBackend#namespace}
---
@@ -241,7 +241,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Path to mount the backend at.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#path GcpSecretBackend#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#path GcpSecretBackend#path}
---
@@ -251,7 +251,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Service Account to impersonate for plugin workload identity federation.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#service_account_email GcpSecretBackend#service_account_email}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#service_account_email GcpSecretBackend#service_account_email}
---
@@ -815,7 +815,7 @@ The construct id used in the generated config for the GcpSecretBackend to import
The id of the existing GcpSecretBackend that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#import import section} in the documentation of this resource for the id to use
---
@@ -1353,7 +1353,7 @@ gcpSecretBackend.GcpSecretBackendConfig(
| default_lease_ttl_seconds
| typing.Union[int, float]
| Default lease duration for secrets in seconds. |
| description
| str
| Human-friendly description of the mount for the backend. |
| disable_remount
| typing.Union[bool, cdktf.IResolvable]
| If set, opts out of mount migration on path updates. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#id GcpSecretBackend#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#id GcpSecretBackend#id}. |
| identity_token_audience
| str
| The audience claim value for plugin identity tokens. |
| identity_token_key
| str
| The key to use for signing identity tokens. |
| identity_token_ttl
| typing.Union[int, float]
| The TTL of generated tokens. |
@@ -1445,7 +1445,7 @@ credentials: str
JSON-encoded credentials to use to connect to GCP.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#credentials GcpSecretBackend#credentials}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#credentials GcpSecretBackend#credentials}
---
@@ -1459,7 +1459,7 @@ default_lease_ttl_seconds: typing.Union[int, float]
Default lease duration for secrets in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#default_lease_ttl_seconds GcpSecretBackend#default_lease_ttl_seconds}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#default_lease_ttl_seconds GcpSecretBackend#default_lease_ttl_seconds}
---
@@ -1473,7 +1473,7 @@ description: str
Human-friendly description of the mount for the backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#description GcpSecretBackend#description}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#description GcpSecretBackend#description}
---
@@ -1487,7 +1487,7 @@ disable_remount: typing.Union[bool, IResolvable]
If set, opts out of mount migration on path updates.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#disable_remount GcpSecretBackend#disable_remount}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#disable_remount GcpSecretBackend#disable_remount}
---
@@ -1499,7 +1499,7 @@ id: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#id GcpSecretBackend#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#id GcpSecretBackend#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1516,7 +1516,7 @@ identity_token_audience: str
The audience claim value for plugin identity tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#identity_token_audience GcpSecretBackend#identity_token_audience}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#identity_token_audience GcpSecretBackend#identity_token_audience}
---
@@ -1530,7 +1530,7 @@ identity_token_key: str
The key to use for signing identity tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#identity_token_key GcpSecretBackend#identity_token_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#identity_token_key GcpSecretBackend#identity_token_key}
---
@@ -1544,7 +1544,7 @@ identity_token_ttl: typing.Union[int, float]
The TTL of generated tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#identity_token_ttl GcpSecretBackend#identity_token_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#identity_token_ttl GcpSecretBackend#identity_token_ttl}
---
@@ -1558,7 +1558,7 @@ local: typing.Union[bool, IResolvable]
Local mount flag that can be explicitly set to true to enforce local mount in HA environment.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#local GcpSecretBackend#local}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#local GcpSecretBackend#local}
---
@@ -1572,7 +1572,7 @@ max_lease_ttl_seconds: typing.Union[int, float]
Maximum possible lease duration for secrets in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#max_lease_ttl_seconds GcpSecretBackend#max_lease_ttl_seconds}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#max_lease_ttl_seconds GcpSecretBackend#max_lease_ttl_seconds}
---
@@ -1586,7 +1586,7 @@ namespace: str
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#namespace GcpSecretBackend#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#namespace GcpSecretBackend#namespace}
---
@@ -1600,7 +1600,7 @@ path: str
Path to mount the backend at.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#path GcpSecretBackend#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#path GcpSecretBackend#path}
---
@@ -1614,7 +1614,7 @@ service_account_email: str
Service Account to impersonate for plugin workload identity federation.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#service_account_email GcpSecretBackend#service_account_email}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#service_account_email GcpSecretBackend#service_account_email}
---
diff --git a/docs/gcpSecretBackend.typescript.md b/docs/gcpSecretBackend.typescript.md
index 586aecb0..803d7335 100644
--- a/docs/gcpSecretBackend.typescript.md
+++ b/docs/gcpSecretBackend.typescript.md
@@ -4,7 +4,7 @@
### GcpSecretBackend
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend vault_gcp_secret_backend}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend vault_gcp_secret_backend}.
#### Initializers
@@ -558,7 +558,7 @@ The construct id used in the generated config for the GcpSecretBackend to import
The id of the existing GcpSecretBackend that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#import import section} in the documentation of this resource for the id to use
---
@@ -1075,7 +1075,7 @@ const gcpSecretBackendConfig: gcpSecretBackend.GcpSecretBackendConfig = { ... }
| defaultLeaseTtlSeconds
| number
| Default lease duration for secrets in seconds. |
| description
| string
| Human-friendly description of the mount for the backend. |
| disableRemount
| boolean \| cdktf.IResolvable
| If set, opts out of mount migration on path updates. |
-| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#id GcpSecretBackend#id}. |
+| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#id GcpSecretBackend#id}. |
| identityTokenAudience
| string
| The audience claim value for plugin identity tokens. |
| identityTokenKey
| string
| The key to use for signing identity tokens. |
| identityTokenTtl
| number
| The TTL of generated tokens. |
@@ -1167,7 +1167,7 @@ public readonly credentials: string;
JSON-encoded credentials to use to connect to GCP.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#credentials GcpSecretBackend#credentials}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#credentials GcpSecretBackend#credentials}
---
@@ -1181,7 +1181,7 @@ public readonly defaultLeaseTtlSeconds: number;
Default lease duration for secrets in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#default_lease_ttl_seconds GcpSecretBackend#default_lease_ttl_seconds}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#default_lease_ttl_seconds GcpSecretBackend#default_lease_ttl_seconds}
---
@@ -1195,7 +1195,7 @@ public readonly description: string;
Human-friendly description of the mount for the backend.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#description GcpSecretBackend#description}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#description GcpSecretBackend#description}
---
@@ -1209,7 +1209,7 @@ public readonly disableRemount: boolean | IResolvable;
If set, opts out of mount migration on path updates.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#disable_remount GcpSecretBackend#disable_remount}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#disable_remount GcpSecretBackend#disable_remount}
---
@@ -1221,7 +1221,7 @@ public readonly id: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#id GcpSecretBackend#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#id GcpSecretBackend#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1238,7 +1238,7 @@ public readonly identityTokenAudience: string;
The audience claim value for plugin identity tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#identity_token_audience GcpSecretBackend#identity_token_audience}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#identity_token_audience GcpSecretBackend#identity_token_audience}
---
@@ -1252,7 +1252,7 @@ public readonly identityTokenKey: string;
The key to use for signing identity tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#identity_token_key GcpSecretBackend#identity_token_key}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#identity_token_key GcpSecretBackend#identity_token_key}
---
@@ -1266,7 +1266,7 @@ public readonly identityTokenTtl: number;
The TTL of generated tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#identity_token_ttl GcpSecretBackend#identity_token_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#identity_token_ttl GcpSecretBackend#identity_token_ttl}
---
@@ -1280,7 +1280,7 @@ public readonly local: boolean | IResolvable;
Local mount flag that can be explicitly set to true to enforce local mount in HA environment.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#local GcpSecretBackend#local}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#local GcpSecretBackend#local}
---
@@ -1294,7 +1294,7 @@ public readonly maxLeaseTtlSeconds: number;
Maximum possible lease duration for secrets in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#max_lease_ttl_seconds GcpSecretBackend#max_lease_ttl_seconds}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#max_lease_ttl_seconds GcpSecretBackend#max_lease_ttl_seconds}
---
@@ -1308,7 +1308,7 @@ public readonly namespace: string;
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#namespace GcpSecretBackend#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#namespace GcpSecretBackend#namespace}
---
@@ -1322,7 +1322,7 @@ public readonly path: string;
Path to mount the backend at.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#path GcpSecretBackend#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#path GcpSecretBackend#path}
---
@@ -1336,7 +1336,7 @@ public readonly serviceAccountEmail: string;
Service Account to impersonate for plugin workload identity federation.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#service_account_email GcpSecretBackend#service_account_email}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#service_account_email GcpSecretBackend#service_account_email}
---
diff --git a/docs/gcpSecretImpersonatedAccount.csharp.md b/docs/gcpSecretImpersonatedAccount.csharp.md
index 99392b58..860aa967 100644
--- a/docs/gcpSecretImpersonatedAccount.csharp.md
+++ b/docs/gcpSecretImpersonatedAccount.csharp.md
@@ -4,7 +4,7 @@
### GcpSecretImpersonatedAccount
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account vault_gcp_secret_impersonated_account}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account vault_gcp_secret_impersonated_account}.
#### Initializers
@@ -76,6 +76,7 @@ Must be unique amongst siblings in the same scope
| ResetId
| *No description.* |
| ResetNamespace
| *No description.* |
| ResetTokenScopes
| *No description.* |
+| ResetTtl
| *No description.* |
---
@@ -385,6 +386,12 @@ private void ResetNamespace()
private void ResetTokenScopes()
```
+##### `ResetTtl`
+
+```csharp
+private void ResetTtl()
+```
+
#### Static Functions
| **Name** | **Description** |
@@ -488,7 +495,7 @@ The construct id used in the generated config for the GcpSecretImpersonatedAccou
The id of the existing GcpSecretImpersonatedAccount that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#import import section} in the documentation of this resource for the id to use
---
@@ -525,12 +532,14 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.
| NamespaceInput
| string
| *No description.* |
| ServiceAccountEmailInput
| string
| *No description.* |
| TokenScopesInput
| string[]
| *No description.* |
+| TtlInput
| string
| *No description.* |
| Backend
| string
| *No description.* |
| Id
| string
| *No description.* |
| ImpersonatedAccount
| string
| *No description.* |
| Namespace
| string
| *No description.* |
| ServiceAccountEmail
| string
| *No description.* |
| TokenScopes
| string[]
| *No description.* |
+| Ttl
| string
| *No description.* |
---
@@ -746,6 +755,16 @@ public string[] TokenScopesInput { get; }
---
+##### `TtlInput`Optional
+
+```csharp
+public string TtlInput { get; }
+```
+
+- *Type:* string
+
+---
+
##### `Backend`Required
```csharp
@@ -806,6 +825,16 @@ public string[] TokenScopes { get; }
---
+##### `Ttl`Required
+
+```csharp
+public string Ttl { get; }
+```
+
+- *Type:* string
+
+---
+
#### Constants
| **Name** | **Type** | **Description** |
@@ -846,7 +875,8 @@ new GcpSecretImpersonatedAccountConfig {
string ServiceAccountEmail,
string Id = null,
string Namespace = null,
- string[] TokenScopes = null
+ string[] TokenScopes = null,
+ string Ttl = null
};
```
@@ -864,9 +894,10 @@ new GcpSecretImpersonatedAccountConfig {
| Backend
| string
| Path where the GCP secrets engine is mounted. |
| ImpersonatedAccount
| string
| Name of the Impersonated Account to create. |
| ServiceAccountEmail
| string
| Email of the GCP service account. |
-| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}. |
+| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}. |
| Namespace
| string
| Target namespace. (requires Enterprise). |
| TokenScopes
| string[]
| List of OAuth scopes to assign to `access_token` secrets generated under this impersonated account (`access_token` impersonated accounts only). |
+| Ttl
| string
| Time to live. |
---
@@ -950,7 +981,7 @@ public string Backend { get; set; }
Path where the GCP secrets engine is mounted.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#backend GcpSecretImpersonatedAccount#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#backend GcpSecretImpersonatedAccount#backend}
---
@@ -964,7 +995,7 @@ public string ImpersonatedAccount { get; set; }
Name of the Impersonated Account to create.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#impersonated_account GcpSecretImpersonatedAccount#impersonated_account}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#impersonated_account GcpSecretImpersonatedAccount#impersonated_account}
---
@@ -978,7 +1009,7 @@ public string ServiceAccountEmail { get; set; }
Email of the GCP service account.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#service_account_email GcpSecretImpersonatedAccount#service_account_email}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#service_account_email GcpSecretImpersonatedAccount#service_account_email}
---
@@ -990,7 +1021,7 @@ public string Id { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1007,7 +1038,7 @@ public string Namespace { get; set; }
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#namespace GcpSecretImpersonatedAccount#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#namespace GcpSecretImpersonatedAccount#namespace}
---
@@ -1021,7 +1052,21 @@ public string[] TokenScopes { get; set; }
List of OAuth scopes to assign to `access_token` secrets generated under this impersonated account (`access_token` impersonated accounts only).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#token_scopes GcpSecretImpersonatedAccount#token_scopes}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#token_scopes GcpSecretImpersonatedAccount#token_scopes}
+
+---
+
+##### `Ttl`Optional
+
+```csharp
+public string Ttl { get; set; }
+```
+
+- *Type:* string
+
+Time to live.
+
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#ttl GcpSecretImpersonatedAccount#ttl}
---
diff --git a/docs/gcpSecretImpersonatedAccount.go.md b/docs/gcpSecretImpersonatedAccount.go.md
index 0364e7ff..21bfdb80 100644
--- a/docs/gcpSecretImpersonatedAccount.go.md
+++ b/docs/gcpSecretImpersonatedAccount.go.md
@@ -4,7 +4,7 @@
### GcpSecretImpersonatedAccount
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account vault_gcp_secret_impersonated_account}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account vault_gcp_secret_impersonated_account}.
#### Initializers
@@ -76,6 +76,7 @@ Must be unique amongst siblings in the same scope
| ResetId
| *No description.* |
| ResetNamespace
| *No description.* |
| ResetTokenScopes
| *No description.* |
+| ResetTtl
| *No description.* |
---
@@ -385,6 +386,12 @@ func ResetNamespace()
func ResetTokenScopes()
```
+##### `ResetTtl`
+
+```go
+func ResetTtl()
+```
+
#### Static Functions
| **Name** | **Description** |
@@ -488,7 +495,7 @@ The construct id used in the generated config for the GcpSecretImpersonatedAccou
The id of the existing GcpSecretImpersonatedAccount that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#import import section} in the documentation of this resource for the id to use
---
@@ -525,12 +532,14 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.
| NamespaceInput
| *string
| *No description.* |
| ServiceAccountEmailInput
| *string
| *No description.* |
| TokenScopesInput
| *[]*string
| *No description.* |
+| TtlInput
| *string
| *No description.* |
| Backend
| *string
| *No description.* |
| Id
| *string
| *No description.* |
| ImpersonatedAccount
| *string
| *No description.* |
| Namespace
| *string
| *No description.* |
| ServiceAccountEmail
| *string
| *No description.* |
| TokenScopes
| *[]*string
| *No description.* |
+| Ttl
| *string
| *No description.* |
---
@@ -746,6 +755,16 @@ func TokenScopesInput() *[]*string
---
+##### `TtlInput`Optional
+
+```go
+func TtlInput() *string
+```
+
+- *Type:* *string
+
+---
+
##### `Backend`Required
```go
@@ -806,6 +825,16 @@ func TokenScopes() *[]*string
---
+##### `Ttl`Required
+
+```go
+func Ttl() *string
+```
+
+- *Type:* *string
+
+---
+
#### Constants
| **Name** | **Type** | **Description** |
@@ -847,6 +876,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/gcpsecretimpersonated
Id: *string,
Namespace: *string,
TokenScopes: *[]*string,
+ Ttl: *string,
}
```
@@ -864,9 +894,10 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/gcpsecretimpersonated
| Backend
| *string
| Path where the GCP secrets engine is mounted. |
| ImpersonatedAccount
| *string
| Name of the Impersonated Account to create. |
| ServiceAccountEmail
| *string
| Email of the GCP service account. |
-| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}. |
+| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}. |
| Namespace
| *string
| Target namespace. (requires Enterprise). |
| TokenScopes
| *[]*string
| List of OAuth scopes to assign to `access_token` secrets generated under this impersonated account (`access_token` impersonated accounts only). |
+| Ttl
| *string
| Time to live. |
---
@@ -950,7 +981,7 @@ Backend *string
Path where the GCP secrets engine is mounted.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#backend GcpSecretImpersonatedAccount#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#backend GcpSecretImpersonatedAccount#backend}
---
@@ -964,7 +995,7 @@ ImpersonatedAccount *string
Name of the Impersonated Account to create.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#impersonated_account GcpSecretImpersonatedAccount#impersonated_account}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#impersonated_account GcpSecretImpersonatedAccount#impersonated_account}
---
@@ -978,7 +1009,7 @@ ServiceAccountEmail *string
Email of the GCP service account.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#service_account_email GcpSecretImpersonatedAccount#service_account_email}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#service_account_email GcpSecretImpersonatedAccount#service_account_email}
---
@@ -990,7 +1021,7 @@ Id *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1007,7 +1038,7 @@ Namespace *string
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#namespace GcpSecretImpersonatedAccount#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#namespace GcpSecretImpersonatedAccount#namespace}
---
@@ -1021,7 +1052,21 @@ TokenScopes *[]*string
List of OAuth scopes to assign to `access_token` secrets generated under this impersonated account (`access_token` impersonated accounts only).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#token_scopes GcpSecretImpersonatedAccount#token_scopes}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#token_scopes GcpSecretImpersonatedAccount#token_scopes}
+
+---
+
+##### `Ttl`Optional
+
+```go
+Ttl *string
+```
+
+- *Type:* *string
+
+Time to live.
+
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#ttl GcpSecretImpersonatedAccount#ttl}
---
diff --git a/docs/gcpSecretImpersonatedAccount.java.md b/docs/gcpSecretImpersonatedAccount.java.md
index b3cdd5b4..aa70cead 100644
--- a/docs/gcpSecretImpersonatedAccount.java.md
+++ b/docs/gcpSecretImpersonatedAccount.java.md
@@ -4,7 +4,7 @@
### GcpSecretImpersonatedAccount
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account vault_gcp_secret_impersonated_account}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account vault_gcp_secret_impersonated_account}.
#### Initializers
@@ -29,6 +29,7 @@ GcpSecretImpersonatedAccount.Builder.create(Construct scope, java.lang.String id
// .id(java.lang.String)
// .namespace(java.lang.String)
// .tokenScopes(java.util.List)
+// .ttl(java.lang.String)
.build();
```
@@ -46,9 +47,10 @@ GcpSecretImpersonatedAccount.Builder.create(Construct scope, java.lang.String id
| backend
| java.lang.String
| Path where the GCP secrets engine is mounted. |
| impersonatedAccount
| java.lang.String
| Name of the Impersonated Account to create. |
| serviceAccountEmail
| java.lang.String
| Email of the GCP service account. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
| tokenScopes
| java.util.List
| List of OAuth scopes to assign to `access_token` secrets generated under this impersonated account (`access_token` impersonated accounts only). |
+| ttl
| java.lang.String
| Time to live. |
---
@@ -118,7 +120,7 @@ Must be unique amongst siblings in the same scope
Path where the GCP secrets engine is mounted.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#backend GcpSecretImpersonatedAccount#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#backend GcpSecretImpersonatedAccount#backend}
---
@@ -128,7 +130,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Name of the Impersonated Account to create.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#impersonated_account GcpSecretImpersonatedAccount#impersonated_account}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#impersonated_account GcpSecretImpersonatedAccount#impersonated_account}
---
@@ -138,7 +140,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Email of the GCP service account.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#service_account_email GcpSecretImpersonatedAccount#service_account_email}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#service_account_email GcpSecretImpersonatedAccount#service_account_email}
---
@@ -146,7 +148,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -159,7 +161,7 @@ If you experience problems setting this value it might not be settable. Please t
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#namespace GcpSecretImpersonatedAccount#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#namespace GcpSecretImpersonatedAccount#namespace}
---
@@ -169,7 +171,17 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
List of OAuth scopes to assign to `access_token` secrets generated under this impersonated account (`access_token` impersonated accounts only).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#token_scopes GcpSecretImpersonatedAccount#token_scopes}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#token_scopes GcpSecretImpersonatedAccount#token_scopes}
+
+---
+
+##### `ttl`Optional
+
+- *Type:* java.lang.String
+
+Time to live.
+
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#ttl GcpSecretImpersonatedAccount#ttl}
---
@@ -203,6 +215,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
| resetId
| *No description.* |
| resetNamespace
| *No description.* |
| resetTokenScopes
| *No description.* |
+| resetTtl
| *No description.* |
---
@@ -514,6 +527,12 @@ public void resetNamespace()
public void resetTokenScopes()
```
+##### `resetTtl`
+
+```java
+public void resetTtl()
+```
+
#### Static Functions
| **Name** | **Description** |
@@ -617,7 +636,7 @@ The construct id used in the generated config for the GcpSecretImpersonatedAccou
The id of the existing GcpSecretImpersonatedAccount that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#import import section} in the documentation of this resource for the id to use
---
@@ -654,12 +673,14 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.
| namespaceInput
| java.lang.String
| *No description.* |
| serviceAccountEmailInput
| java.lang.String
| *No description.* |
| tokenScopesInput
| java.util.List
| *No description.* |
+| ttlInput
| java.lang.String
| *No description.* |
| backend
| java.lang.String
| *No description.* |
| id
| java.lang.String
| *No description.* |
| impersonatedAccount
| java.lang.String
| *No description.* |
| namespace
| java.lang.String
| *No description.* |
| serviceAccountEmail
| java.lang.String
| *No description.* |
| tokenScopes
| java.util.List
| *No description.* |
+| ttl
| java.lang.String
| *No description.* |
---
@@ -875,6 +896,16 @@ public java.util.List getTokenScopesInput();
---
+##### `ttlInput`Optional
+
+```java
+public java.lang.String getTtlInput();
+```
+
+- *Type:* java.lang.String
+
+---
+
##### `backend`Required
```java
@@ -935,6 +966,16 @@ public java.util.List getTokenScopes();
---
+##### `ttl`Required
+
+```java
+public java.lang.String getTtl();
+```
+
+- *Type:* java.lang.String
+
+---
+
#### Constants
| **Name** | **Type** | **Description** |
@@ -980,6 +1021,7 @@ GcpSecretImpersonatedAccountConfig.builder()
// .id(java.lang.String)
// .namespace(java.lang.String)
// .tokenScopes(java.util.List)
+// .ttl(java.lang.String)
.build();
```
@@ -997,9 +1039,10 @@ GcpSecretImpersonatedAccountConfig.builder()
| backend
| java.lang.String
| Path where the GCP secrets engine is mounted. |
| impersonatedAccount
| java.lang.String
| Name of the Impersonated Account to create. |
| serviceAccountEmail
| java.lang.String
| Email of the GCP service account. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
| tokenScopes
| java.util.List
| List of OAuth scopes to assign to `access_token` secrets generated under this impersonated account (`access_token` impersonated accounts only). |
+| ttl
| java.lang.String
| Time to live. |
---
@@ -1083,7 +1126,7 @@ public java.lang.String getBackend();
Path where the GCP secrets engine is mounted.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#backend GcpSecretImpersonatedAccount#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#backend GcpSecretImpersonatedAccount#backend}
---
@@ -1097,7 +1140,7 @@ public java.lang.String getImpersonatedAccount();
Name of the Impersonated Account to create.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#impersonated_account GcpSecretImpersonatedAccount#impersonated_account}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#impersonated_account GcpSecretImpersonatedAccount#impersonated_account}
---
@@ -1111,7 +1154,7 @@ public java.lang.String getServiceAccountEmail();
Email of the GCP service account.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#service_account_email GcpSecretImpersonatedAccount#service_account_email}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#service_account_email GcpSecretImpersonatedAccount#service_account_email}
---
@@ -1123,7 +1166,7 @@ public java.lang.String getId();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1140,7 +1183,7 @@ public java.lang.String getNamespace();
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#namespace GcpSecretImpersonatedAccount#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#namespace GcpSecretImpersonatedAccount#namespace}
---
@@ -1154,7 +1197,21 @@ public java.util.List getTokenScopes();
List of OAuth scopes to assign to `access_token` secrets generated under this impersonated account (`access_token` impersonated accounts only).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#token_scopes GcpSecretImpersonatedAccount#token_scopes}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#token_scopes GcpSecretImpersonatedAccount#token_scopes}
+
+---
+
+##### `ttl`Optional
+
+```java
+public java.lang.String getTtl();
+```
+
+- *Type:* java.lang.String
+
+Time to live.
+
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#ttl GcpSecretImpersonatedAccount#ttl}
---
diff --git a/docs/gcpSecretImpersonatedAccount.python.md b/docs/gcpSecretImpersonatedAccount.python.md
index 326de6bf..101ce949 100644
--- a/docs/gcpSecretImpersonatedAccount.python.md
+++ b/docs/gcpSecretImpersonatedAccount.python.md
@@ -4,7 +4,7 @@
### GcpSecretImpersonatedAccount
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account vault_gcp_secret_impersonated_account}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account vault_gcp_secret_impersonated_account}.
#### Initializers
@@ -26,7 +26,8 @@ gcpSecretImpersonatedAccount.GcpSecretImpersonatedAccount(
service_account_email: str,
id: str = None,
namespace: str = None,
- token_scopes: typing.List[str] = None
+ token_scopes: typing.List[str] = None,
+ ttl: str = None
)
```
@@ -44,9 +45,10 @@ gcpSecretImpersonatedAccount.GcpSecretImpersonatedAccount(
| backend
| str
| Path where the GCP secrets engine is mounted. |
| impersonated_account
| str
| Name of the Impersonated Account to create. |
| service_account_email
| str
| Email of the GCP service account. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
| token_scopes
| typing.List[str]
| List of OAuth scopes to assign to `access_token` secrets generated under this impersonated account (`access_token` impersonated accounts only). |
+| ttl
| str
| Time to live. |
---
@@ -116,7 +118,7 @@ Must be unique amongst siblings in the same scope
Path where the GCP secrets engine is mounted.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#backend GcpSecretImpersonatedAccount#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#backend GcpSecretImpersonatedAccount#backend}
---
@@ -126,7 +128,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Name of the Impersonated Account to create.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#impersonated_account GcpSecretImpersonatedAccount#impersonated_account}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#impersonated_account GcpSecretImpersonatedAccount#impersonated_account}
---
@@ -136,7 +138,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Email of the GCP service account.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#service_account_email GcpSecretImpersonatedAccount#service_account_email}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#service_account_email GcpSecretImpersonatedAccount#service_account_email}
---
@@ -144,7 +146,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -157,7 +159,7 @@ If you experience problems setting this value it might not be settable. Please t
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#namespace GcpSecretImpersonatedAccount#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#namespace GcpSecretImpersonatedAccount#namespace}
---
@@ -167,7 +169,17 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
List of OAuth scopes to assign to `access_token` secrets generated under this impersonated account (`access_token` impersonated accounts only).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#token_scopes GcpSecretImpersonatedAccount#token_scopes}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#token_scopes GcpSecretImpersonatedAccount#token_scopes}
+
+---
+
+##### `ttl`Optional
+
+- *Type:* str
+
+Time to live.
+
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#ttl GcpSecretImpersonatedAccount#ttl}
---
@@ -201,6 +213,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
| reset_id
| *No description.* |
| reset_namespace
| *No description.* |
| reset_token_scopes
| *No description.* |
+| reset_ttl
| *No description.* |
---
@@ -547,6 +560,12 @@ def reset_namespace() -> None
def reset_token_scopes() -> None
```
+##### `reset_ttl`
+
+```python
+def reset_ttl() -> None
+```
+
#### Static Functions
| **Name** | **Description** |
@@ -661,7 +680,7 @@ The construct id used in the generated config for the GcpSecretImpersonatedAccou
The id of the existing GcpSecretImpersonatedAccount that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#import import section} in the documentation of this resource for the id to use
---
@@ -698,12 +717,14 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.
| namespace_input
| str
| *No description.* |
| service_account_email_input
| str
| *No description.* |
| token_scopes_input
| typing.List[str]
| *No description.* |
+| ttl_input
| str
| *No description.* |
| backend
| str
| *No description.* |
| id
| str
| *No description.* |
| impersonated_account
| str
| *No description.* |
| namespace
| str
| *No description.* |
| service_account_email
| str
| *No description.* |
| token_scopes
| typing.List[str]
| *No description.* |
+| ttl
| str
| *No description.* |
---
@@ -919,6 +940,16 @@ token_scopes_input: typing.List[str]
---
+##### `ttl_input`Optional
+
+```python
+ttl_input: str
+```
+
+- *Type:* str
+
+---
+
##### `backend`Required
```python
@@ -979,6 +1010,16 @@ token_scopes: typing.List[str]
---
+##### `ttl`Required
+
+```python
+ttl: str
+```
+
+- *Type:* str
+
+---
+
#### Constants
| **Name** | **Type** | **Description** |
@@ -1019,7 +1060,8 @@ gcpSecretImpersonatedAccount.GcpSecretImpersonatedAccountConfig(
service_account_email: str,
id: str = None,
namespace: str = None,
- token_scopes: typing.List[str] = None
+ token_scopes: typing.List[str] = None,
+ ttl: str = None
)
```
@@ -1037,9 +1079,10 @@ gcpSecretImpersonatedAccount.GcpSecretImpersonatedAccountConfig(
| backend
| str
| Path where the GCP secrets engine is mounted. |
| impersonated_account
| str
| Name of the Impersonated Account to create. |
| service_account_email
| str
| Email of the GCP service account. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
| token_scopes
| typing.List[str]
| List of OAuth scopes to assign to `access_token` secrets generated under this impersonated account (`access_token` impersonated accounts only). |
+| ttl
| str
| Time to live. |
---
@@ -1123,7 +1166,7 @@ backend: str
Path where the GCP secrets engine is mounted.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#backend GcpSecretImpersonatedAccount#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#backend GcpSecretImpersonatedAccount#backend}
---
@@ -1137,7 +1180,7 @@ impersonated_account: str
Name of the Impersonated Account to create.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#impersonated_account GcpSecretImpersonatedAccount#impersonated_account}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#impersonated_account GcpSecretImpersonatedAccount#impersonated_account}
---
@@ -1151,7 +1194,7 @@ service_account_email: str
Email of the GCP service account.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#service_account_email GcpSecretImpersonatedAccount#service_account_email}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#service_account_email GcpSecretImpersonatedAccount#service_account_email}
---
@@ -1163,7 +1206,7 @@ id: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1180,7 +1223,7 @@ namespace: str
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#namespace GcpSecretImpersonatedAccount#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#namespace GcpSecretImpersonatedAccount#namespace}
---
@@ -1194,7 +1237,21 @@ token_scopes: typing.List[str]
List of OAuth scopes to assign to `access_token` secrets generated under this impersonated account (`access_token` impersonated accounts only).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#token_scopes GcpSecretImpersonatedAccount#token_scopes}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#token_scopes GcpSecretImpersonatedAccount#token_scopes}
+
+---
+
+##### `ttl`Optional
+
+```python
+ttl: str
+```
+
+- *Type:* str
+
+Time to live.
+
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#ttl GcpSecretImpersonatedAccount#ttl}
---
diff --git a/docs/gcpSecretImpersonatedAccount.typescript.md b/docs/gcpSecretImpersonatedAccount.typescript.md
index 4e198d80..966e3893 100644
--- a/docs/gcpSecretImpersonatedAccount.typescript.md
+++ b/docs/gcpSecretImpersonatedAccount.typescript.md
@@ -4,7 +4,7 @@
### GcpSecretImpersonatedAccount
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account vault_gcp_secret_impersonated_account}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account vault_gcp_secret_impersonated_account}.
#### Initializers
@@ -76,6 +76,7 @@ Must be unique amongst siblings in the same scope
| resetId
| *No description.* |
| resetNamespace
| *No description.* |
| resetTokenScopes
| *No description.* |
+| resetTtl
| *No description.* |
---
@@ -385,6 +386,12 @@ public resetNamespace(): void
public resetTokenScopes(): void
```
+##### `resetTtl`
+
+```typescript
+public resetTtl(): void
+```
+
#### Static Functions
| **Name** | **Description** |
@@ -488,7 +495,7 @@ The construct id used in the generated config for the GcpSecretImpersonatedAccou
The id of the existing GcpSecretImpersonatedAccount that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#import import section} in the documentation of this resource for the id to use
---
@@ -525,12 +532,14 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.
| namespaceInput
| string
| *No description.* |
| serviceAccountEmailInput
| string
| *No description.* |
| tokenScopesInput
| string[]
| *No description.* |
+| ttlInput
| string
| *No description.* |
| backend
| string
| *No description.* |
| id
| string
| *No description.* |
| impersonatedAccount
| string
| *No description.* |
| namespace
| string
| *No description.* |
| serviceAccountEmail
| string
| *No description.* |
| tokenScopes
| string[]
| *No description.* |
+| ttl
| string
| *No description.* |
---
@@ -746,6 +755,16 @@ public readonly tokenScopesInput: string[];
---
+##### `ttlInput`Optional
+
+```typescript
+public readonly ttlInput: string;
+```
+
+- *Type:* string
+
+---
+
##### `backend`Required
```typescript
@@ -806,6 +825,16 @@ public readonly tokenScopes: string[];
---
+##### `ttl`Required
+
+```typescript
+public readonly ttl: string;
+```
+
+- *Type:* string
+
+---
+
#### Constants
| **Name** | **Type** | **Description** |
@@ -850,9 +879,10 @@ const gcpSecretImpersonatedAccountConfig: gcpSecretImpersonatedAccount.GcpSecret
| backend
| string
| Path where the GCP secrets engine is mounted. |
| impersonatedAccount
| string
| Name of the Impersonated Account to create. |
| serviceAccountEmail
| string
| Email of the GCP service account. |
-| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}. |
+| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}. |
| namespace
| string
| Target namespace. (requires Enterprise). |
| tokenScopes
| string[]
| List of OAuth scopes to assign to `access_token` secrets generated under this impersonated account (`access_token` impersonated accounts only). |
+| ttl
| string
| Time to live. |
---
@@ -936,7 +966,7 @@ public readonly backend: string;
Path where the GCP secrets engine is mounted.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#backend GcpSecretImpersonatedAccount#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#backend GcpSecretImpersonatedAccount#backend}
---
@@ -950,7 +980,7 @@ public readonly impersonatedAccount: string;
Name of the Impersonated Account to create.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#impersonated_account GcpSecretImpersonatedAccount#impersonated_account}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#impersonated_account GcpSecretImpersonatedAccount#impersonated_account}
---
@@ -964,7 +994,7 @@ public readonly serviceAccountEmail: string;
Email of the GCP service account.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#service_account_email GcpSecretImpersonatedAccount#service_account_email}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#service_account_email GcpSecretImpersonatedAccount#service_account_email}
---
@@ -976,7 +1006,7 @@ public readonly id: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -993,7 +1023,7 @@ public readonly namespace: string;
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#namespace GcpSecretImpersonatedAccount#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#namespace GcpSecretImpersonatedAccount#namespace}
---
@@ -1007,7 +1037,21 @@ public readonly tokenScopes: string[];
List of OAuth scopes to assign to `access_token` secrets generated under this impersonated account (`access_token` impersonated accounts only).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#token_scopes GcpSecretImpersonatedAccount#token_scopes}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#token_scopes GcpSecretImpersonatedAccount#token_scopes}
+
+---
+
+##### `ttl`Optional
+
+```typescript
+public readonly ttl: string;
+```
+
+- *Type:* string
+
+Time to live.
+
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#ttl GcpSecretImpersonatedAccount#ttl}
---
diff --git a/docs/gcpSecretRoleset.csharp.md b/docs/gcpSecretRoleset.csharp.md
index 8f92c403..0a6e6504 100644
--- a/docs/gcpSecretRoleset.csharp.md
+++ b/docs/gcpSecretRoleset.csharp.md
@@ -4,7 +4,7 @@
### GcpSecretRoleset
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset vault_gcp_secret_roleset}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset vault_gcp_secret_roleset}.
#### Initializers
@@ -508,7 +508,7 @@ The construct id used in the generated config for the GcpSecretRoleset to import
The id of the existing GcpSecretRoleset that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#import import section} in the documentation of this resource for the id to use
---
@@ -922,7 +922,7 @@ public string Resource { get; set; }
Resource name.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#resource GcpSecretRoleset#resource}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#resource GcpSecretRoleset#resource}
---
@@ -936,7 +936,7 @@ public string[] Roles { get; set; }
List of roles to apply to the resource.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#roles GcpSecretRoleset#roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#roles GcpSecretRoleset#roles}
---
@@ -981,7 +981,7 @@ new GcpSecretRolesetConfig {
| Binding
| object
| binding block. |
| Project
| string
| Name of the GCP project that this roleset's service account will belong to. |
| Roleset
| string
| Name of the RoleSet to create. |
-| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#id GcpSecretRoleset#id}. |
+| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#id GcpSecretRoleset#id}. |
| Namespace
| string
| Target namespace. (requires Enterprise). |
| SecretType
| string
| Type of secret generated for this role set. Defaults to `access_token`. Accepted values: `access_token`, `service_account_key`. |
| TokenScopes
| string[]
| List of OAuth scopes to assign to `access_token` secrets generated under this role set (`access_token` role sets only). |
@@ -1068,7 +1068,7 @@ public string Backend { get; set; }
Path where the GCP secrets engine is mounted.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#backend GcpSecretRoleset#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#backend GcpSecretRoleset#backend}
---
@@ -1082,7 +1082,7 @@ public object Binding { get; set; }
binding block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#binding GcpSecretRoleset#binding}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#binding GcpSecretRoleset#binding}
---
@@ -1096,7 +1096,7 @@ public string Project { get; set; }
Name of the GCP project that this roleset's service account will belong to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#project GcpSecretRoleset#project}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#project GcpSecretRoleset#project}
---
@@ -1110,7 +1110,7 @@ public string Roleset { get; set; }
Name of the RoleSet to create.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#roleset GcpSecretRoleset#roleset}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#roleset GcpSecretRoleset#roleset}
---
@@ -1122,7 +1122,7 @@ public string Id { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#id GcpSecretRoleset#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#id GcpSecretRoleset#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1139,7 +1139,7 @@ public string Namespace { get; set; }
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#namespace GcpSecretRoleset#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#namespace GcpSecretRoleset#namespace}
---
@@ -1153,7 +1153,7 @@ public string SecretType { get; set; }
Type of secret generated for this role set. Defaults to `access_token`. Accepted values: `access_token`, `service_account_key`.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#secret_type GcpSecretRoleset#secret_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#secret_type GcpSecretRoleset#secret_type}
---
@@ -1167,7 +1167,7 @@ public string[] TokenScopes { get; set; }
List of OAuth scopes to assign to `access_token` secrets generated under this role set (`access_token` role sets only).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#token_scopes GcpSecretRoleset#token_scopes}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#token_scopes GcpSecretRoleset#token_scopes}
---
diff --git a/docs/gcpSecretRoleset.go.md b/docs/gcpSecretRoleset.go.md
index 8845acc4..50a6593f 100644
--- a/docs/gcpSecretRoleset.go.md
+++ b/docs/gcpSecretRoleset.go.md
@@ -4,7 +4,7 @@
### GcpSecretRoleset
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset vault_gcp_secret_roleset}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset vault_gcp_secret_roleset}.
#### Initializers
@@ -508,7 +508,7 @@ The construct id used in the generated config for the GcpSecretRoleset to import
The id of the existing GcpSecretRoleset that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#import import section} in the documentation of this resource for the id to use
---
@@ -922,7 +922,7 @@ Resource *string
Resource name.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#resource GcpSecretRoleset#resource}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#resource GcpSecretRoleset#resource}
---
@@ -936,7 +936,7 @@ Roles *[]*string
List of roles to apply to the resource.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#roles GcpSecretRoleset#roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#roles GcpSecretRoleset#roles}
---
@@ -981,7 +981,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/gcpsecretroleset"
| Binding
| interface{}
| binding block. |
| Project
| *string
| Name of the GCP project that this roleset's service account will belong to. |
| Roleset
| *string
| Name of the RoleSet to create. |
-| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#id GcpSecretRoleset#id}. |
+| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#id GcpSecretRoleset#id}. |
| Namespace
| *string
| Target namespace. (requires Enterprise). |
| SecretType
| *string
| Type of secret generated for this role set. Defaults to `access_token`. Accepted values: `access_token`, `service_account_key`. |
| TokenScopes
| *[]*string
| List of OAuth scopes to assign to `access_token` secrets generated under this role set (`access_token` role sets only). |
@@ -1068,7 +1068,7 @@ Backend *string
Path where the GCP secrets engine is mounted.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#backend GcpSecretRoleset#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#backend GcpSecretRoleset#backend}
---
@@ -1082,7 +1082,7 @@ Binding interface{}
binding block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#binding GcpSecretRoleset#binding}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#binding GcpSecretRoleset#binding}
---
@@ -1096,7 +1096,7 @@ Project *string
Name of the GCP project that this roleset's service account will belong to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#project GcpSecretRoleset#project}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#project GcpSecretRoleset#project}
---
@@ -1110,7 +1110,7 @@ Roleset *string
Name of the RoleSet to create.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#roleset GcpSecretRoleset#roleset}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#roleset GcpSecretRoleset#roleset}
---
@@ -1122,7 +1122,7 @@ Id *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#id GcpSecretRoleset#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#id GcpSecretRoleset#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1139,7 +1139,7 @@ Namespace *string
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#namespace GcpSecretRoleset#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#namespace GcpSecretRoleset#namespace}
---
@@ -1153,7 +1153,7 @@ SecretType *string
Type of secret generated for this role set. Defaults to `access_token`. Accepted values: `access_token`, `service_account_key`.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#secret_type GcpSecretRoleset#secret_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#secret_type GcpSecretRoleset#secret_type}
---
@@ -1167,7 +1167,7 @@ TokenScopes *[]*string
List of OAuth scopes to assign to `access_token` secrets generated under this role set (`access_token` role sets only).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#token_scopes GcpSecretRoleset#token_scopes}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#token_scopes GcpSecretRoleset#token_scopes}
---
diff --git a/docs/gcpSecretRoleset.java.md b/docs/gcpSecretRoleset.java.md
index 337b0461..ab0b4cce 100644
--- a/docs/gcpSecretRoleset.java.md
+++ b/docs/gcpSecretRoleset.java.md
@@ -4,7 +4,7 @@
### GcpSecretRoleset
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset vault_gcp_secret_roleset}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset vault_gcp_secret_roleset}.
#### Initializers
@@ -50,7 +50,7 @@ GcpSecretRoleset.Builder.create(Construct scope, java.lang.String id)
| binding
| com.hashicorp.cdktf.IResolvable OR java.util.List<GcpSecretRolesetBinding>
| binding block. |
| project
| java.lang.String
| Name of the GCP project that this roleset's service account will belong to. |
| roleset
| java.lang.String
| Name of the RoleSet to create. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#id GcpSecretRoleset#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#id GcpSecretRoleset#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
| secretType
| java.lang.String
| Type of secret generated for this role set. Defaults to `access_token`. Accepted values: `access_token`, `service_account_key`. |
| tokenScopes
| java.util.List
| List of OAuth scopes to assign to `access_token` secrets generated under this role set (`access_token` role sets only). |
@@ -123,7 +123,7 @@ Must be unique amongst siblings in the same scope
Path where the GCP secrets engine is mounted.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#backend GcpSecretRoleset#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#backend GcpSecretRoleset#backend}
---
@@ -133,7 +133,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
binding block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#binding GcpSecretRoleset#binding}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#binding GcpSecretRoleset#binding}
---
@@ -143,7 +143,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Name of the GCP project that this roleset's service account will belong to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#project GcpSecretRoleset#project}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#project GcpSecretRoleset#project}
---
@@ -153,7 +153,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Name of the RoleSet to create.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#roleset GcpSecretRoleset#roleset}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#roleset GcpSecretRoleset#roleset}
---
@@ -161,7 +161,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#id GcpSecretRoleset#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#id GcpSecretRoleset#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -174,7 +174,7 @@ If you experience problems setting this value it might not be settable. Please t
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#namespace GcpSecretRoleset#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#namespace GcpSecretRoleset#namespace}
---
@@ -184,7 +184,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Type of secret generated for this role set. Defaults to `access_token`. Accepted values: `access_token`, `service_account_key`.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#secret_type GcpSecretRoleset#secret_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#secret_type GcpSecretRoleset#secret_type}
---
@@ -194,7 +194,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
List of OAuth scopes to assign to `access_token` secrets generated under this role set (`access_token` role sets only).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#token_scopes GcpSecretRoleset#token_scopes}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#token_scopes GcpSecretRoleset#token_scopes}
---
@@ -662,7 +662,7 @@ The construct id used in the generated config for the GcpSecretRoleset to import
The id of the existing GcpSecretRoleset that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#import import section} in the documentation of this resource for the id to use
---
@@ -1076,7 +1076,7 @@ public java.lang.String getResource();
Resource name.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#resource GcpSecretRoleset#resource}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#resource GcpSecretRoleset#resource}
---
@@ -1090,7 +1090,7 @@ public java.util.List getRoles();
List of roles to apply to the resource.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#roles GcpSecretRoleset#roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#roles GcpSecretRoleset#roles}
---
@@ -1140,7 +1140,7 @@ GcpSecretRolesetConfig.builder()
| binding
| com.hashicorp.cdktf.IResolvable OR java.util.List<GcpSecretRolesetBinding>
| binding block. |
| project
| java.lang.String
| Name of the GCP project that this roleset's service account will belong to. |
| roleset
| java.lang.String
| Name of the RoleSet to create. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#id GcpSecretRoleset#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#id GcpSecretRoleset#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
| secretType
| java.lang.String
| Type of secret generated for this role set. Defaults to `access_token`. Accepted values: `access_token`, `service_account_key`. |
| tokenScopes
| java.util.List
| List of OAuth scopes to assign to `access_token` secrets generated under this role set (`access_token` role sets only). |
@@ -1227,7 +1227,7 @@ public java.lang.String getBackend();
Path where the GCP secrets engine is mounted.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#backend GcpSecretRoleset#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#backend GcpSecretRoleset#backend}
---
@@ -1241,7 +1241,7 @@ public java.lang.Object getBinding();
binding block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#binding GcpSecretRoleset#binding}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#binding GcpSecretRoleset#binding}
---
@@ -1255,7 +1255,7 @@ public java.lang.String getProject();
Name of the GCP project that this roleset's service account will belong to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#project GcpSecretRoleset#project}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#project GcpSecretRoleset#project}
---
@@ -1269,7 +1269,7 @@ public java.lang.String getRoleset();
Name of the RoleSet to create.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#roleset GcpSecretRoleset#roleset}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#roleset GcpSecretRoleset#roleset}
---
@@ -1281,7 +1281,7 @@ public java.lang.String getId();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#id GcpSecretRoleset#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#id GcpSecretRoleset#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1298,7 +1298,7 @@ public java.lang.String getNamespace();
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#namespace GcpSecretRoleset#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#namespace GcpSecretRoleset#namespace}
---
@@ -1312,7 +1312,7 @@ public java.lang.String getSecretType();
Type of secret generated for this role set. Defaults to `access_token`. Accepted values: `access_token`, `service_account_key`.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#secret_type GcpSecretRoleset#secret_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#secret_type GcpSecretRoleset#secret_type}
---
@@ -1326,7 +1326,7 @@ public java.util.List getTokenScopes();
List of OAuth scopes to assign to `access_token` secrets generated under this role set (`access_token` role sets only).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#token_scopes GcpSecretRoleset#token_scopes}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#token_scopes GcpSecretRoleset#token_scopes}
---
diff --git a/docs/gcpSecretRoleset.python.md b/docs/gcpSecretRoleset.python.md
index f184e3a8..7b2e59dc 100644
--- a/docs/gcpSecretRoleset.python.md
+++ b/docs/gcpSecretRoleset.python.md
@@ -4,7 +4,7 @@
### GcpSecretRoleset
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset vault_gcp_secret_roleset}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset vault_gcp_secret_roleset}.
#### Initializers
@@ -47,7 +47,7 @@ gcpSecretRoleset.GcpSecretRoleset(
| binding
| typing.Union[cdktf.IResolvable, typing.List[GcpSecretRolesetBinding]]
| binding block. |
| project
| str
| Name of the GCP project that this roleset's service account will belong to. |
| roleset
| str
| Name of the RoleSet to create. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#id GcpSecretRoleset#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#id GcpSecretRoleset#id}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
| secret_type
| str
| Type of secret generated for this role set. Defaults to `access_token`. Accepted values: `access_token`, `service_account_key`. |
| token_scopes
| typing.List[str]
| List of OAuth scopes to assign to `access_token` secrets generated under this role set (`access_token` role sets only). |
@@ -120,7 +120,7 @@ Must be unique amongst siblings in the same scope
Path where the GCP secrets engine is mounted.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#backend GcpSecretRoleset#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#backend GcpSecretRoleset#backend}
---
@@ -130,7 +130,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
binding block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#binding GcpSecretRoleset#binding}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#binding GcpSecretRoleset#binding}
---
@@ -140,7 +140,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Name of the GCP project that this roleset's service account will belong to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#project GcpSecretRoleset#project}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#project GcpSecretRoleset#project}
---
@@ -150,7 +150,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Name of the RoleSet to create.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#roleset GcpSecretRoleset#roleset}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#roleset GcpSecretRoleset#roleset}
---
@@ -158,7 +158,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#id GcpSecretRoleset#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#id GcpSecretRoleset#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -171,7 +171,7 @@ If you experience problems setting this value it might not be settable. Please t
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#namespace GcpSecretRoleset#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#namespace GcpSecretRoleset#namespace}
---
@@ -181,7 +181,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Type of secret generated for this role set. Defaults to `access_token`. Accepted values: `access_token`, `service_account_key`.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#secret_type GcpSecretRoleset#secret_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#secret_type GcpSecretRoleset#secret_type}
---
@@ -191,7 +191,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
List of OAuth scopes to assign to `access_token` secrets generated under this role set (`access_token` role sets only).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#token_scopes GcpSecretRoleset#token_scopes}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#token_scopes GcpSecretRoleset#token_scopes}
---
@@ -707,7 +707,7 @@ The construct id used in the generated config for the GcpSecretRoleset to import
The id of the existing GcpSecretRoleset that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#import import section} in the documentation of this resource for the id to use
---
@@ -1121,7 +1121,7 @@ resource: str
Resource name.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#resource GcpSecretRoleset#resource}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#resource GcpSecretRoleset#resource}
---
@@ -1135,7 +1135,7 @@ roles: typing.List[str]
List of roles to apply to the resource.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#roles GcpSecretRoleset#roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#roles GcpSecretRoleset#roles}
---
@@ -1180,7 +1180,7 @@ gcpSecretRoleset.GcpSecretRolesetConfig(
| binding
| typing.Union[cdktf.IResolvable, typing.List[GcpSecretRolesetBinding]]
| binding block. |
| project
| str
| Name of the GCP project that this roleset's service account will belong to. |
| roleset
| str
| Name of the RoleSet to create. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#id GcpSecretRoleset#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#id GcpSecretRoleset#id}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
| secret_type
| str
| Type of secret generated for this role set. Defaults to `access_token`. Accepted values: `access_token`, `service_account_key`. |
| token_scopes
| typing.List[str]
| List of OAuth scopes to assign to `access_token` secrets generated under this role set (`access_token` role sets only). |
@@ -1267,7 +1267,7 @@ backend: str
Path where the GCP secrets engine is mounted.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#backend GcpSecretRoleset#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#backend GcpSecretRoleset#backend}
---
@@ -1281,7 +1281,7 @@ binding: typing.Union[IResolvable, typing.List[GcpSecretRolesetBinding]]
binding block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#binding GcpSecretRoleset#binding}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#binding GcpSecretRoleset#binding}
---
@@ -1295,7 +1295,7 @@ project: str
Name of the GCP project that this roleset's service account will belong to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#project GcpSecretRoleset#project}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#project GcpSecretRoleset#project}
---
@@ -1309,7 +1309,7 @@ roleset: str
Name of the RoleSet to create.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#roleset GcpSecretRoleset#roleset}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#roleset GcpSecretRoleset#roleset}
---
@@ -1321,7 +1321,7 @@ id: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#id GcpSecretRoleset#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#id GcpSecretRoleset#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1338,7 +1338,7 @@ namespace: str
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#namespace GcpSecretRoleset#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#namespace GcpSecretRoleset#namespace}
---
@@ -1352,7 +1352,7 @@ secret_type: str
Type of secret generated for this role set. Defaults to `access_token`. Accepted values: `access_token`, `service_account_key`.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#secret_type GcpSecretRoleset#secret_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#secret_type GcpSecretRoleset#secret_type}
---
@@ -1366,7 +1366,7 @@ token_scopes: typing.List[str]
List of OAuth scopes to assign to `access_token` secrets generated under this role set (`access_token` role sets only).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#token_scopes GcpSecretRoleset#token_scopes}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#token_scopes GcpSecretRoleset#token_scopes}
---
diff --git a/docs/gcpSecretRoleset.typescript.md b/docs/gcpSecretRoleset.typescript.md
index 27c490e0..9439e214 100644
--- a/docs/gcpSecretRoleset.typescript.md
+++ b/docs/gcpSecretRoleset.typescript.md
@@ -4,7 +4,7 @@
### GcpSecretRoleset
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset vault_gcp_secret_roleset}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset vault_gcp_secret_roleset}.
#### Initializers
@@ -508,7 +508,7 @@ The construct id used in the generated config for the GcpSecretRoleset to import
The id of the existing GcpSecretRoleset that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#import import section} in the documentation of this resource for the id to use
---
@@ -919,7 +919,7 @@ public readonly resource: string;
Resource name.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#resource GcpSecretRoleset#resource}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#resource GcpSecretRoleset#resource}
---
@@ -933,7 +933,7 @@ public readonly roles: string[];
List of roles to apply to the resource.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#roles GcpSecretRoleset#roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#roles GcpSecretRoleset#roles}
---
@@ -962,7 +962,7 @@ const gcpSecretRolesetConfig: gcpSecretRoleset.GcpSecretRolesetConfig = { ... }
| binding
| cdktf.IResolvable \| GcpSecretRolesetBinding[]
| binding block. |
| project
| string
| Name of the GCP project that this roleset's service account will belong to. |
| roleset
| string
| Name of the RoleSet to create. |
-| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#id GcpSecretRoleset#id}. |
+| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#id GcpSecretRoleset#id}. |
| namespace
| string
| Target namespace. (requires Enterprise). |
| secretType
| string
| Type of secret generated for this role set. Defaults to `access_token`. Accepted values: `access_token`, `service_account_key`. |
| tokenScopes
| string[]
| List of OAuth scopes to assign to `access_token` secrets generated under this role set (`access_token` role sets only). |
@@ -1049,7 +1049,7 @@ public readonly backend: string;
Path where the GCP secrets engine is mounted.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#backend GcpSecretRoleset#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#backend GcpSecretRoleset#backend}
---
@@ -1063,7 +1063,7 @@ public readonly binding: IResolvable | GcpSecretRolesetBinding[];
binding block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#binding GcpSecretRoleset#binding}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#binding GcpSecretRoleset#binding}
---
@@ -1077,7 +1077,7 @@ public readonly project: string;
Name of the GCP project that this roleset's service account will belong to.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#project GcpSecretRoleset#project}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#project GcpSecretRoleset#project}
---
@@ -1091,7 +1091,7 @@ public readonly roleset: string;
Name of the RoleSet to create.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#roleset GcpSecretRoleset#roleset}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#roleset GcpSecretRoleset#roleset}
---
@@ -1103,7 +1103,7 @@ public readonly id: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#id GcpSecretRoleset#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#id GcpSecretRoleset#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1120,7 +1120,7 @@ public readonly namespace: string;
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#namespace GcpSecretRoleset#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#namespace GcpSecretRoleset#namespace}
---
@@ -1134,7 +1134,7 @@ public readonly secretType: string;
Type of secret generated for this role set. Defaults to `access_token`. Accepted values: `access_token`, `service_account_key`.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#secret_type GcpSecretRoleset#secret_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#secret_type GcpSecretRoleset#secret_type}
---
@@ -1148,7 +1148,7 @@ public readonly tokenScopes: string[];
List of OAuth scopes to assign to `access_token` secrets generated under this role set (`access_token` role sets only).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#token_scopes GcpSecretRoleset#token_scopes}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#token_scopes GcpSecretRoleset#token_scopes}
---
diff --git a/docs/gcpSecretStaticAccount.csharp.md b/docs/gcpSecretStaticAccount.csharp.md
index 4bee3fa3..8bc71504 100644
--- a/docs/gcpSecretStaticAccount.csharp.md
+++ b/docs/gcpSecretStaticAccount.csharp.md
@@ -4,7 +4,7 @@
### GcpSecretStaticAccount
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account vault_gcp_secret_static_account}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account vault_gcp_secret_static_account}.
#### Initializers
@@ -515,7 +515,7 @@ The construct id used in the generated config for the GcpSecretStaticAccount to
The id of the existing GcpSecretStaticAccount that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#import import section} in the documentation of this resource for the id to use
---
@@ -929,7 +929,7 @@ public string Resource { get; set; }
Resource name.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#resource GcpSecretStaticAccount#resource}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#resource GcpSecretStaticAccount#resource}
---
@@ -943,7 +943,7 @@ public string[] Roles { get; set; }
List of roles to apply to the resource.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#roles GcpSecretStaticAccount#roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#roles GcpSecretStaticAccount#roles}
---
@@ -988,7 +988,7 @@ new GcpSecretStaticAccountConfig {
| ServiceAccountEmail
| string
| Email of the GCP service account. |
| StaticAccount
| string
| Name of the Static Account to create. |
| Binding
| object
| binding block. |
-| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#id GcpSecretStaticAccount#id}. |
+| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#id GcpSecretStaticAccount#id}. |
| Namespace
| string
| Target namespace. (requires Enterprise). |
| SecretType
| string
| Type of secret generated for this static account. Defaults to `access_token`. Accepted values: `access_token`, `service_account_key`. |
| TokenScopes
| string[]
| List of OAuth scopes to assign to `access_token` secrets generated under this static account (`access_token` static accounts only). |
@@ -1075,7 +1075,7 @@ public string Backend { get; set; }
Path where the GCP secrets engine is mounted.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#backend GcpSecretStaticAccount#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#backend GcpSecretStaticAccount#backend}
---
@@ -1089,7 +1089,7 @@ public string ServiceAccountEmail { get; set; }
Email of the GCP service account.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#service_account_email GcpSecretStaticAccount#service_account_email}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#service_account_email GcpSecretStaticAccount#service_account_email}
---
@@ -1103,7 +1103,7 @@ public string StaticAccount { get; set; }
Name of the Static Account to create.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#static_account GcpSecretStaticAccount#static_account}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#static_account GcpSecretStaticAccount#static_account}
---
@@ -1117,7 +1117,7 @@ public object Binding { get; set; }
binding block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#binding GcpSecretStaticAccount#binding}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#binding GcpSecretStaticAccount#binding}
---
@@ -1129,7 +1129,7 @@ public string Id { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#id GcpSecretStaticAccount#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#id GcpSecretStaticAccount#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1146,7 +1146,7 @@ public string Namespace { get; set; }
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#namespace GcpSecretStaticAccount#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#namespace GcpSecretStaticAccount#namespace}
---
@@ -1160,7 +1160,7 @@ public string SecretType { get; set; }
Type of secret generated for this static account. Defaults to `access_token`. Accepted values: `access_token`, `service_account_key`.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#secret_type GcpSecretStaticAccount#secret_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#secret_type GcpSecretStaticAccount#secret_type}
---
@@ -1174,7 +1174,7 @@ public string[] TokenScopes { get; set; }
List of OAuth scopes to assign to `access_token` secrets generated under this static account (`access_token` static accounts only).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#token_scopes GcpSecretStaticAccount#token_scopes}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#token_scopes GcpSecretStaticAccount#token_scopes}
---
diff --git a/docs/gcpSecretStaticAccount.go.md b/docs/gcpSecretStaticAccount.go.md
index 5a96d92a..92544efc 100644
--- a/docs/gcpSecretStaticAccount.go.md
+++ b/docs/gcpSecretStaticAccount.go.md
@@ -4,7 +4,7 @@
### GcpSecretStaticAccount
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account vault_gcp_secret_static_account}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account vault_gcp_secret_static_account}.
#### Initializers
@@ -515,7 +515,7 @@ The construct id used in the generated config for the GcpSecretStaticAccount to
The id of the existing GcpSecretStaticAccount that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#import import section} in the documentation of this resource for the id to use
---
@@ -929,7 +929,7 @@ Resource *string
Resource name.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#resource GcpSecretStaticAccount#resource}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#resource GcpSecretStaticAccount#resource}
---
@@ -943,7 +943,7 @@ Roles *[]*string
List of roles to apply to the resource.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#roles GcpSecretStaticAccount#roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#roles GcpSecretStaticAccount#roles}
---
@@ -988,7 +988,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/gcpsecretstaticaccoun
| ServiceAccountEmail
| *string
| Email of the GCP service account. |
| StaticAccount
| *string
| Name of the Static Account to create. |
| Binding
| interface{}
| binding block. |
-| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#id GcpSecretStaticAccount#id}. |
+| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#id GcpSecretStaticAccount#id}. |
| Namespace
| *string
| Target namespace. (requires Enterprise). |
| SecretType
| *string
| Type of secret generated for this static account. Defaults to `access_token`. Accepted values: `access_token`, `service_account_key`. |
| TokenScopes
| *[]*string
| List of OAuth scopes to assign to `access_token` secrets generated under this static account (`access_token` static accounts only). |
@@ -1075,7 +1075,7 @@ Backend *string
Path where the GCP secrets engine is mounted.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#backend GcpSecretStaticAccount#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#backend GcpSecretStaticAccount#backend}
---
@@ -1089,7 +1089,7 @@ ServiceAccountEmail *string
Email of the GCP service account.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#service_account_email GcpSecretStaticAccount#service_account_email}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#service_account_email GcpSecretStaticAccount#service_account_email}
---
@@ -1103,7 +1103,7 @@ StaticAccount *string
Name of the Static Account to create.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#static_account GcpSecretStaticAccount#static_account}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#static_account GcpSecretStaticAccount#static_account}
---
@@ -1117,7 +1117,7 @@ Binding interface{}
binding block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#binding GcpSecretStaticAccount#binding}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#binding GcpSecretStaticAccount#binding}
---
@@ -1129,7 +1129,7 @@ Id *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#id GcpSecretStaticAccount#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#id GcpSecretStaticAccount#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1146,7 +1146,7 @@ Namespace *string
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#namespace GcpSecretStaticAccount#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#namespace GcpSecretStaticAccount#namespace}
---
@@ -1160,7 +1160,7 @@ SecretType *string
Type of secret generated for this static account. Defaults to `access_token`. Accepted values: `access_token`, `service_account_key`.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#secret_type GcpSecretStaticAccount#secret_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#secret_type GcpSecretStaticAccount#secret_type}
---
@@ -1174,7 +1174,7 @@ TokenScopes *[]*string
List of OAuth scopes to assign to `access_token` secrets generated under this static account (`access_token` static accounts only).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#token_scopes GcpSecretStaticAccount#token_scopes}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#token_scopes GcpSecretStaticAccount#token_scopes}
---
diff --git a/docs/gcpSecretStaticAccount.java.md b/docs/gcpSecretStaticAccount.java.md
index 4e9af41a..49d9f389 100644
--- a/docs/gcpSecretStaticAccount.java.md
+++ b/docs/gcpSecretStaticAccount.java.md
@@ -4,7 +4,7 @@
### GcpSecretStaticAccount
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account vault_gcp_secret_static_account}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account vault_gcp_secret_static_account}.
#### Initializers
@@ -50,7 +50,7 @@ GcpSecretStaticAccount.Builder.create(Construct scope, java.lang.String id)
| serviceAccountEmail
| java.lang.String
| Email of the GCP service account. |
| staticAccount
| java.lang.String
| Name of the Static Account to create. |
| binding
| com.hashicorp.cdktf.IResolvable OR java.util.List<GcpSecretStaticAccountBinding>
| binding block. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#id GcpSecretStaticAccount#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#id GcpSecretStaticAccount#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
| secretType
| java.lang.String
| Type of secret generated for this static account. Defaults to `access_token`. Accepted values: `access_token`, `service_account_key`. |
| tokenScopes
| java.util.List
| List of OAuth scopes to assign to `access_token` secrets generated under this static account (`access_token` static accounts only). |
@@ -123,7 +123,7 @@ Must be unique amongst siblings in the same scope
Path where the GCP secrets engine is mounted.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#backend GcpSecretStaticAccount#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#backend GcpSecretStaticAccount#backend}
---
@@ -133,7 +133,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Email of the GCP service account.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#service_account_email GcpSecretStaticAccount#service_account_email}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#service_account_email GcpSecretStaticAccount#service_account_email}
---
@@ -143,7 +143,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Name of the Static Account to create.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#static_account GcpSecretStaticAccount#static_account}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#static_account GcpSecretStaticAccount#static_account}
---
@@ -153,7 +153,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
binding block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#binding GcpSecretStaticAccount#binding}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#binding GcpSecretStaticAccount#binding}
---
@@ -161,7 +161,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#id GcpSecretStaticAccount#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#id GcpSecretStaticAccount#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -174,7 +174,7 @@ If you experience problems setting this value it might not be settable. Please t
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#namespace GcpSecretStaticAccount#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#namespace GcpSecretStaticAccount#namespace}
---
@@ -184,7 +184,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Type of secret generated for this static account. Defaults to `access_token`. Accepted values: `access_token`, `service_account_key`.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#secret_type GcpSecretStaticAccount#secret_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#secret_type GcpSecretStaticAccount#secret_type}
---
@@ -194,7 +194,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
List of OAuth scopes to assign to `access_token` secrets generated under this static account (`access_token` static accounts only).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#token_scopes GcpSecretStaticAccount#token_scopes}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#token_scopes GcpSecretStaticAccount#token_scopes}
---
@@ -669,7 +669,7 @@ The construct id used in the generated config for the GcpSecretStaticAccount to
The id of the existing GcpSecretStaticAccount that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#import import section} in the documentation of this resource for the id to use
---
@@ -1083,7 +1083,7 @@ public java.lang.String getResource();
Resource name.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#resource GcpSecretStaticAccount#resource}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#resource GcpSecretStaticAccount#resource}
---
@@ -1097,7 +1097,7 @@ public java.util.List getRoles();
List of roles to apply to the resource.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#roles GcpSecretStaticAccount#roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#roles GcpSecretStaticAccount#roles}
---
@@ -1147,7 +1147,7 @@ GcpSecretStaticAccountConfig.builder()
| serviceAccountEmail
| java.lang.String
| Email of the GCP service account. |
| staticAccount
| java.lang.String
| Name of the Static Account to create. |
| binding
| com.hashicorp.cdktf.IResolvable OR java.util.List<GcpSecretStaticAccountBinding>
| binding block. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#id GcpSecretStaticAccount#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#id GcpSecretStaticAccount#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
| secretType
| java.lang.String
| Type of secret generated for this static account. Defaults to `access_token`. Accepted values: `access_token`, `service_account_key`. |
| tokenScopes
| java.util.List
| List of OAuth scopes to assign to `access_token` secrets generated under this static account (`access_token` static accounts only). |
@@ -1234,7 +1234,7 @@ public java.lang.String getBackend();
Path where the GCP secrets engine is mounted.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#backend GcpSecretStaticAccount#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#backend GcpSecretStaticAccount#backend}
---
@@ -1248,7 +1248,7 @@ public java.lang.String getServiceAccountEmail();
Email of the GCP service account.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#service_account_email GcpSecretStaticAccount#service_account_email}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#service_account_email GcpSecretStaticAccount#service_account_email}
---
@@ -1262,7 +1262,7 @@ public java.lang.String getStaticAccount();
Name of the Static Account to create.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#static_account GcpSecretStaticAccount#static_account}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#static_account GcpSecretStaticAccount#static_account}
---
@@ -1276,7 +1276,7 @@ public java.lang.Object getBinding();
binding block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#binding GcpSecretStaticAccount#binding}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#binding GcpSecretStaticAccount#binding}
---
@@ -1288,7 +1288,7 @@ public java.lang.String getId();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#id GcpSecretStaticAccount#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#id GcpSecretStaticAccount#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1305,7 +1305,7 @@ public java.lang.String getNamespace();
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#namespace GcpSecretStaticAccount#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#namespace GcpSecretStaticAccount#namespace}
---
@@ -1319,7 +1319,7 @@ public java.lang.String getSecretType();
Type of secret generated for this static account. Defaults to `access_token`. Accepted values: `access_token`, `service_account_key`.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#secret_type GcpSecretStaticAccount#secret_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#secret_type GcpSecretStaticAccount#secret_type}
---
@@ -1333,7 +1333,7 @@ public java.util.List getTokenScopes();
List of OAuth scopes to assign to `access_token` secrets generated under this static account (`access_token` static accounts only).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#token_scopes GcpSecretStaticAccount#token_scopes}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#token_scopes GcpSecretStaticAccount#token_scopes}
---
diff --git a/docs/gcpSecretStaticAccount.python.md b/docs/gcpSecretStaticAccount.python.md
index a3317479..a993d782 100644
--- a/docs/gcpSecretStaticAccount.python.md
+++ b/docs/gcpSecretStaticAccount.python.md
@@ -4,7 +4,7 @@
### GcpSecretStaticAccount
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account vault_gcp_secret_static_account}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account vault_gcp_secret_static_account}.
#### Initializers
@@ -47,7 +47,7 @@ gcpSecretStaticAccount.GcpSecretStaticAccount(
| service_account_email
| str
| Email of the GCP service account. |
| static_account
| str
| Name of the Static Account to create. |
| binding
| typing.Union[cdktf.IResolvable, typing.List[GcpSecretStaticAccountBinding]]
| binding block. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#id GcpSecretStaticAccount#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#id GcpSecretStaticAccount#id}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
| secret_type
| str
| Type of secret generated for this static account. Defaults to `access_token`. Accepted values: `access_token`, `service_account_key`. |
| token_scopes
| typing.List[str]
| List of OAuth scopes to assign to `access_token` secrets generated under this static account (`access_token` static accounts only). |
@@ -120,7 +120,7 @@ Must be unique amongst siblings in the same scope
Path where the GCP secrets engine is mounted.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#backend GcpSecretStaticAccount#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#backend GcpSecretStaticAccount#backend}
---
@@ -130,7 +130,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Email of the GCP service account.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#service_account_email GcpSecretStaticAccount#service_account_email}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#service_account_email GcpSecretStaticAccount#service_account_email}
---
@@ -140,7 +140,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Name of the Static Account to create.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#static_account GcpSecretStaticAccount#static_account}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#static_account GcpSecretStaticAccount#static_account}
---
@@ -150,7 +150,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
binding block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#binding GcpSecretStaticAccount#binding}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#binding GcpSecretStaticAccount#binding}
---
@@ -158,7 +158,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#id GcpSecretStaticAccount#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#id GcpSecretStaticAccount#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -171,7 +171,7 @@ If you experience problems setting this value it might not be settable. Please t
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#namespace GcpSecretStaticAccount#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#namespace GcpSecretStaticAccount#namespace}
---
@@ -181,7 +181,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Type of secret generated for this static account. Defaults to `access_token`. Accepted values: `access_token`, `service_account_key`.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#secret_type GcpSecretStaticAccount#secret_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#secret_type GcpSecretStaticAccount#secret_type}
---
@@ -191,7 +191,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
List of OAuth scopes to assign to `access_token` secrets generated under this static account (`access_token` static accounts only).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#token_scopes GcpSecretStaticAccount#token_scopes}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#token_scopes GcpSecretStaticAccount#token_scopes}
---
@@ -714,7 +714,7 @@ The construct id used in the generated config for the GcpSecretStaticAccount to
The id of the existing GcpSecretStaticAccount that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#import import section} in the documentation of this resource for the id to use
---
@@ -1128,7 +1128,7 @@ resource: str
Resource name.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#resource GcpSecretStaticAccount#resource}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#resource GcpSecretStaticAccount#resource}
---
@@ -1142,7 +1142,7 @@ roles: typing.List[str]
List of roles to apply to the resource.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#roles GcpSecretStaticAccount#roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#roles GcpSecretStaticAccount#roles}
---
@@ -1187,7 +1187,7 @@ gcpSecretStaticAccount.GcpSecretStaticAccountConfig(
| service_account_email
| str
| Email of the GCP service account. |
| static_account
| str
| Name of the Static Account to create. |
| binding
| typing.Union[cdktf.IResolvable, typing.List[GcpSecretStaticAccountBinding]]
| binding block. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#id GcpSecretStaticAccount#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#id GcpSecretStaticAccount#id}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
| secret_type
| str
| Type of secret generated for this static account. Defaults to `access_token`. Accepted values: `access_token`, `service_account_key`. |
| token_scopes
| typing.List[str]
| List of OAuth scopes to assign to `access_token` secrets generated under this static account (`access_token` static accounts only). |
@@ -1274,7 +1274,7 @@ backend: str
Path where the GCP secrets engine is mounted.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#backend GcpSecretStaticAccount#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#backend GcpSecretStaticAccount#backend}
---
@@ -1288,7 +1288,7 @@ service_account_email: str
Email of the GCP service account.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#service_account_email GcpSecretStaticAccount#service_account_email}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#service_account_email GcpSecretStaticAccount#service_account_email}
---
@@ -1302,7 +1302,7 @@ static_account: str
Name of the Static Account to create.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#static_account GcpSecretStaticAccount#static_account}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#static_account GcpSecretStaticAccount#static_account}
---
@@ -1316,7 +1316,7 @@ binding: typing.Union[IResolvable, typing.List[GcpSecretStaticAccountBinding]]
binding block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#binding GcpSecretStaticAccount#binding}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#binding GcpSecretStaticAccount#binding}
---
@@ -1328,7 +1328,7 @@ id: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#id GcpSecretStaticAccount#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#id GcpSecretStaticAccount#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1345,7 +1345,7 @@ namespace: str
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#namespace GcpSecretStaticAccount#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#namespace GcpSecretStaticAccount#namespace}
---
@@ -1359,7 +1359,7 @@ secret_type: str
Type of secret generated for this static account. Defaults to `access_token`. Accepted values: `access_token`, `service_account_key`.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#secret_type GcpSecretStaticAccount#secret_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#secret_type GcpSecretStaticAccount#secret_type}
---
@@ -1373,7 +1373,7 @@ token_scopes: typing.List[str]
List of OAuth scopes to assign to `access_token` secrets generated under this static account (`access_token` static accounts only).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#token_scopes GcpSecretStaticAccount#token_scopes}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#token_scopes GcpSecretStaticAccount#token_scopes}
---
diff --git a/docs/gcpSecretStaticAccount.typescript.md b/docs/gcpSecretStaticAccount.typescript.md
index caad5756..5c143739 100644
--- a/docs/gcpSecretStaticAccount.typescript.md
+++ b/docs/gcpSecretStaticAccount.typescript.md
@@ -4,7 +4,7 @@
### GcpSecretStaticAccount
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account vault_gcp_secret_static_account}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account vault_gcp_secret_static_account}.
#### Initializers
@@ -515,7 +515,7 @@ The construct id used in the generated config for the GcpSecretStaticAccount to
The id of the existing GcpSecretStaticAccount that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#import import section} in the documentation of this resource for the id to use
---
@@ -926,7 +926,7 @@ public readonly resource: string;
Resource name.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#resource GcpSecretStaticAccount#resource}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#resource GcpSecretStaticAccount#resource}
---
@@ -940,7 +940,7 @@ public readonly roles: string[];
List of roles to apply to the resource.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#roles GcpSecretStaticAccount#roles}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#roles GcpSecretStaticAccount#roles}
---
@@ -969,7 +969,7 @@ const gcpSecretStaticAccountConfig: gcpSecretStaticAccount.GcpSecretStaticAccoun
| serviceAccountEmail
| string
| Email of the GCP service account. |
| staticAccount
| string
| Name of the Static Account to create. |
| binding
| cdktf.IResolvable \| GcpSecretStaticAccountBinding[]
| binding block. |
-| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#id GcpSecretStaticAccount#id}. |
+| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#id GcpSecretStaticAccount#id}. |
| namespace
| string
| Target namespace. (requires Enterprise). |
| secretType
| string
| Type of secret generated for this static account. Defaults to `access_token`. Accepted values: `access_token`, `service_account_key`. |
| tokenScopes
| string[]
| List of OAuth scopes to assign to `access_token` secrets generated under this static account (`access_token` static accounts only). |
@@ -1056,7 +1056,7 @@ public readonly backend: string;
Path where the GCP secrets engine is mounted.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#backend GcpSecretStaticAccount#backend}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#backend GcpSecretStaticAccount#backend}
---
@@ -1070,7 +1070,7 @@ public readonly serviceAccountEmail: string;
Email of the GCP service account.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#service_account_email GcpSecretStaticAccount#service_account_email}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#service_account_email GcpSecretStaticAccount#service_account_email}
---
@@ -1084,7 +1084,7 @@ public readonly staticAccount: string;
Name of the Static Account to create.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#static_account GcpSecretStaticAccount#static_account}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#static_account GcpSecretStaticAccount#static_account}
---
@@ -1098,7 +1098,7 @@ public readonly binding: IResolvable | GcpSecretStaticAccountBinding[];
binding block.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#binding GcpSecretStaticAccount#binding}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#binding GcpSecretStaticAccount#binding}
---
@@ -1110,7 +1110,7 @@ public readonly id: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#id GcpSecretStaticAccount#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#id GcpSecretStaticAccount#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1127,7 +1127,7 @@ public readonly namespace: string;
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#namespace GcpSecretStaticAccount#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#namespace GcpSecretStaticAccount#namespace}
---
@@ -1141,7 +1141,7 @@ public readonly secretType: string;
Type of secret generated for this static account. Defaults to `access_token`. Accepted values: `access_token`, `service_account_key`.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#secret_type GcpSecretStaticAccount#secret_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#secret_type GcpSecretStaticAccount#secret_type}
---
@@ -1155,7 +1155,7 @@ public readonly tokenScopes: string[];
List of OAuth scopes to assign to `access_token` secrets generated under this static account (`access_token` static accounts only).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#token_scopes GcpSecretStaticAccount#token_scopes}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#token_scopes GcpSecretStaticAccount#token_scopes}
---
diff --git a/docs/genericEndpoint.csharp.md b/docs/genericEndpoint.csharp.md
index 806df96b..3438f60e 100644
--- a/docs/genericEndpoint.csharp.md
+++ b/docs/genericEndpoint.csharp.md
@@ -4,7 +4,7 @@
### GenericEndpoint
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint vault_generic_endpoint}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint vault_generic_endpoint}.
#### Initializers
@@ -509,7 +509,7 @@ The construct id used in the generated config for the GenericEndpoint to import.
The id of the existing GenericEndpoint that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#import import section} in the documentation of this resource for the id to use
---
@@ -943,7 +943,7 @@ new GenericEndpointConfig {
| Path
| string
| Full path where to the endpoint that will be written. |
| DisableDelete
| object
| Don't attempt to delete the path from Vault if true. |
| DisableRead
| object
| Don't attempt to read the path from Vault if true; drift won't be detected. |
-| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#id GenericEndpoint#id}. |
+| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#id GenericEndpoint#id}. |
| IgnoreAbsentFields
| object
| When reading, disregard fields not present in data_json. |
| Namespace
| string
| Target namespace. (requires Enterprise). |
| WriteFields
| string[]
| Top-level fields returned by write to persist in state. |
@@ -1030,7 +1030,7 @@ public string DataJson { get; set; }
JSON-encoded data to write.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#data_json GenericEndpoint#data_json}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#data_json GenericEndpoint#data_json}
---
@@ -1044,7 +1044,7 @@ public string Path { get; set; }
Full path where to the endpoint that will be written.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#path GenericEndpoint#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#path GenericEndpoint#path}
---
@@ -1058,7 +1058,7 @@ public object DisableDelete { get; set; }
Don't attempt to delete the path from Vault if true.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#disable_delete GenericEndpoint#disable_delete}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#disable_delete GenericEndpoint#disable_delete}
---
@@ -1072,7 +1072,7 @@ public object DisableRead { get; set; }
Don't attempt to read the path from Vault if true; drift won't be detected.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#disable_read GenericEndpoint#disable_read}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#disable_read GenericEndpoint#disable_read}
---
@@ -1084,7 +1084,7 @@ public string Id { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#id GenericEndpoint#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#id GenericEndpoint#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1101,7 +1101,7 @@ public object IgnoreAbsentFields { get; set; }
When reading, disregard fields not present in data_json.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#ignore_absent_fields GenericEndpoint#ignore_absent_fields}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#ignore_absent_fields GenericEndpoint#ignore_absent_fields}
---
@@ -1115,7 +1115,7 @@ public string Namespace { get; set; }
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#namespace GenericEndpoint#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#namespace GenericEndpoint#namespace}
---
@@ -1129,7 +1129,7 @@ public string[] WriteFields { get; set; }
Top-level fields returned by write to persist in state.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#write_fields GenericEndpoint#write_fields}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#write_fields GenericEndpoint#write_fields}
---
diff --git a/docs/genericEndpoint.go.md b/docs/genericEndpoint.go.md
index 3c7db094..37982c59 100644
--- a/docs/genericEndpoint.go.md
+++ b/docs/genericEndpoint.go.md
@@ -4,7 +4,7 @@
### GenericEndpoint
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint vault_generic_endpoint}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint vault_generic_endpoint}.
#### Initializers
@@ -509,7 +509,7 @@ The construct id used in the generated config for the GenericEndpoint to import.
The id of the existing GenericEndpoint that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#import import section} in the documentation of this resource for the id to use
---
@@ -943,7 +943,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/genericendpoint"
| Path
| *string
| Full path where to the endpoint that will be written. |
| DisableDelete
| interface{}
| Don't attempt to delete the path from Vault if true. |
| DisableRead
| interface{}
| Don't attempt to read the path from Vault if true; drift won't be detected. |
-| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#id GenericEndpoint#id}. |
+| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#id GenericEndpoint#id}. |
| IgnoreAbsentFields
| interface{}
| When reading, disregard fields not present in data_json. |
| Namespace
| *string
| Target namespace. (requires Enterprise). |
| WriteFields
| *[]*string
| Top-level fields returned by write to persist in state. |
@@ -1030,7 +1030,7 @@ DataJson *string
JSON-encoded data to write.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#data_json GenericEndpoint#data_json}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#data_json GenericEndpoint#data_json}
---
@@ -1044,7 +1044,7 @@ Path *string
Full path where to the endpoint that will be written.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#path GenericEndpoint#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#path GenericEndpoint#path}
---
@@ -1058,7 +1058,7 @@ DisableDelete interface{}
Don't attempt to delete the path from Vault if true.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#disable_delete GenericEndpoint#disable_delete}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#disable_delete GenericEndpoint#disable_delete}
---
@@ -1072,7 +1072,7 @@ DisableRead interface{}
Don't attempt to read the path from Vault if true; drift won't be detected.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#disable_read GenericEndpoint#disable_read}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#disable_read GenericEndpoint#disable_read}
---
@@ -1084,7 +1084,7 @@ Id *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#id GenericEndpoint#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#id GenericEndpoint#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1101,7 +1101,7 @@ IgnoreAbsentFields interface{}
When reading, disregard fields not present in data_json.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#ignore_absent_fields GenericEndpoint#ignore_absent_fields}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#ignore_absent_fields GenericEndpoint#ignore_absent_fields}
---
@@ -1115,7 +1115,7 @@ Namespace *string
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#namespace GenericEndpoint#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#namespace GenericEndpoint#namespace}
---
@@ -1129,7 +1129,7 @@ WriteFields *[]*string
Top-level fields returned by write to persist in state.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#write_fields GenericEndpoint#write_fields}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#write_fields GenericEndpoint#write_fields}
---
diff --git a/docs/genericEndpoint.java.md b/docs/genericEndpoint.java.md
index e5e82db9..4053a179 100644
--- a/docs/genericEndpoint.java.md
+++ b/docs/genericEndpoint.java.md
@@ -4,7 +4,7 @@
### GenericEndpoint
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint vault_generic_endpoint}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint vault_generic_endpoint}.
#### Initializers
@@ -52,7 +52,7 @@ GenericEndpoint.Builder.create(Construct scope, java.lang.String id)
| path
| java.lang.String
| Full path where to the endpoint that will be written. |
| disableDelete
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| Don't attempt to delete the path from Vault if true. |
| disableRead
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| Don't attempt to read the path from Vault if true; drift won't be detected. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#id GenericEndpoint#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#id GenericEndpoint#id}. |
| ignoreAbsentFields
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| When reading, disregard fields not present in data_json. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
| writeFields
| java.util.List
| Top-level fields returned by write to persist in state. |
@@ -125,7 +125,7 @@ Must be unique amongst siblings in the same scope
JSON-encoded data to write.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#data_json GenericEndpoint#data_json}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#data_json GenericEndpoint#data_json}
---
@@ -135,7 +135,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Full path where to the endpoint that will be written.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#path GenericEndpoint#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#path GenericEndpoint#path}
---
@@ -145,7 +145,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Don't attempt to delete the path from Vault if true.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#disable_delete GenericEndpoint#disable_delete}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#disable_delete GenericEndpoint#disable_delete}
---
@@ -155,7 +155,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Don't attempt to read the path from Vault if true; drift won't be detected.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#disable_read GenericEndpoint#disable_read}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#disable_read GenericEndpoint#disable_read}
---
@@ -163,7 +163,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#id GenericEndpoint#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#id GenericEndpoint#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -176,7 +176,7 @@ If you experience problems setting this value it might not be settable. Please t
When reading, disregard fields not present in data_json.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#ignore_absent_fields GenericEndpoint#ignore_absent_fields}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#ignore_absent_fields GenericEndpoint#ignore_absent_fields}
---
@@ -186,7 +186,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#namespace GenericEndpoint#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#namespace GenericEndpoint#namespace}
---
@@ -196,7 +196,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Top-level fields returned by write to persist in state.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#write_fields GenericEndpoint#write_fields}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#write_fields GenericEndpoint#write_fields}
---
@@ -665,7 +665,7 @@ The construct id used in the generated config for the GenericEndpoint to import.
The id of the existing GenericEndpoint that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#import import section} in the documentation of this resource for the id to use
---
@@ -1106,7 +1106,7 @@ GenericEndpointConfig.builder()
| path
| java.lang.String
| Full path where to the endpoint that will be written. |
| disableDelete
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| Don't attempt to delete the path from Vault if true. |
| disableRead
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| Don't attempt to read the path from Vault if true; drift won't be detected. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#id GenericEndpoint#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#id GenericEndpoint#id}. |
| ignoreAbsentFields
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| When reading, disregard fields not present in data_json. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
| writeFields
| java.util.List
| Top-level fields returned by write to persist in state. |
@@ -1193,7 +1193,7 @@ public java.lang.String getDataJson();
JSON-encoded data to write.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#data_json GenericEndpoint#data_json}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#data_json GenericEndpoint#data_json}
---
@@ -1207,7 +1207,7 @@ public java.lang.String getPath();
Full path where to the endpoint that will be written.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#path GenericEndpoint#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#path GenericEndpoint#path}
---
@@ -1221,7 +1221,7 @@ public java.lang.Object getDisableDelete();
Don't attempt to delete the path from Vault if true.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#disable_delete GenericEndpoint#disable_delete}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#disable_delete GenericEndpoint#disable_delete}
---
@@ -1235,7 +1235,7 @@ public java.lang.Object getDisableRead();
Don't attempt to read the path from Vault if true; drift won't be detected.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#disable_read GenericEndpoint#disable_read}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#disable_read GenericEndpoint#disable_read}
---
@@ -1247,7 +1247,7 @@ public java.lang.String getId();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#id GenericEndpoint#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#id GenericEndpoint#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1264,7 +1264,7 @@ public java.lang.Object getIgnoreAbsentFields();
When reading, disregard fields not present in data_json.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#ignore_absent_fields GenericEndpoint#ignore_absent_fields}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#ignore_absent_fields GenericEndpoint#ignore_absent_fields}
---
@@ -1278,7 +1278,7 @@ public java.lang.String getNamespace();
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#namespace GenericEndpoint#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#namespace GenericEndpoint#namespace}
---
@@ -1292,7 +1292,7 @@ public java.util.List getWriteFields();
Top-level fields returned by write to persist in state.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#write_fields GenericEndpoint#write_fields}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#write_fields GenericEndpoint#write_fields}
---
diff --git a/docs/genericEndpoint.python.md b/docs/genericEndpoint.python.md
index f3772dfe..a5c2f806 100644
--- a/docs/genericEndpoint.python.md
+++ b/docs/genericEndpoint.python.md
@@ -4,7 +4,7 @@
### GenericEndpoint
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint vault_generic_endpoint}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint vault_generic_endpoint}.
#### Initializers
@@ -47,7 +47,7 @@ genericEndpoint.GenericEndpoint(
| path
| str
| Full path where to the endpoint that will be written. |
| disable_delete
| typing.Union[bool, cdktf.IResolvable]
| Don't attempt to delete the path from Vault if true. |
| disable_read
| typing.Union[bool, cdktf.IResolvable]
| Don't attempt to read the path from Vault if true; drift won't be detected. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#id GenericEndpoint#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#id GenericEndpoint#id}. |
| ignore_absent_fields
| typing.Union[bool, cdktf.IResolvable]
| When reading, disregard fields not present in data_json. |
| namespace
| str
| Target namespace. (requires Enterprise). |
| write_fields
| typing.List[str]
| Top-level fields returned by write to persist in state. |
@@ -120,7 +120,7 @@ Must be unique amongst siblings in the same scope
JSON-encoded data to write.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#data_json GenericEndpoint#data_json}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#data_json GenericEndpoint#data_json}
---
@@ -130,7 +130,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Full path where to the endpoint that will be written.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#path GenericEndpoint#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#path GenericEndpoint#path}
---
@@ -140,7 +140,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Don't attempt to delete the path from Vault if true.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#disable_delete GenericEndpoint#disable_delete}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#disable_delete GenericEndpoint#disable_delete}
---
@@ -150,7 +150,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Don't attempt to read the path from Vault if true; drift won't be detected.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#disable_read GenericEndpoint#disable_read}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#disable_read GenericEndpoint#disable_read}
---
@@ -158,7 +158,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#id GenericEndpoint#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#id GenericEndpoint#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -171,7 +171,7 @@ If you experience problems setting this value it might not be settable. Please t
When reading, disregard fields not present in data_json.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#ignore_absent_fields GenericEndpoint#ignore_absent_fields}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#ignore_absent_fields GenericEndpoint#ignore_absent_fields}
---
@@ -181,7 +181,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#namespace GenericEndpoint#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#namespace GenericEndpoint#namespace}
---
@@ -191,7 +191,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Top-level fields returned by write to persist in state.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#write_fields GenericEndpoint#write_fields}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#write_fields GenericEndpoint#write_fields}
---
@@ -706,7 +706,7 @@ The construct id used in the generated config for the GenericEndpoint to import.
The id of the existing GenericEndpoint that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#import import section} in the documentation of this resource for the id to use
---
@@ -1140,7 +1140,7 @@ genericEndpoint.GenericEndpointConfig(
| path
| str
| Full path where to the endpoint that will be written. |
| disable_delete
| typing.Union[bool, cdktf.IResolvable]
| Don't attempt to delete the path from Vault if true. |
| disable_read
| typing.Union[bool, cdktf.IResolvable]
| Don't attempt to read the path from Vault if true; drift won't be detected. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#id GenericEndpoint#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#id GenericEndpoint#id}. |
| ignore_absent_fields
| typing.Union[bool, cdktf.IResolvable]
| When reading, disregard fields not present in data_json. |
| namespace
| str
| Target namespace. (requires Enterprise). |
| write_fields
| typing.List[str]
| Top-level fields returned by write to persist in state. |
@@ -1227,7 +1227,7 @@ data_json: str
JSON-encoded data to write.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#data_json GenericEndpoint#data_json}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#data_json GenericEndpoint#data_json}
---
@@ -1241,7 +1241,7 @@ path: str
Full path where to the endpoint that will be written.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#path GenericEndpoint#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#path GenericEndpoint#path}
---
@@ -1255,7 +1255,7 @@ disable_delete: typing.Union[bool, IResolvable]
Don't attempt to delete the path from Vault if true.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#disable_delete GenericEndpoint#disable_delete}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#disable_delete GenericEndpoint#disable_delete}
---
@@ -1269,7 +1269,7 @@ disable_read: typing.Union[bool, IResolvable]
Don't attempt to read the path from Vault if true; drift won't be detected.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#disable_read GenericEndpoint#disable_read}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#disable_read GenericEndpoint#disable_read}
---
@@ -1281,7 +1281,7 @@ id: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#id GenericEndpoint#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#id GenericEndpoint#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1298,7 +1298,7 @@ ignore_absent_fields: typing.Union[bool, IResolvable]
When reading, disregard fields not present in data_json.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#ignore_absent_fields GenericEndpoint#ignore_absent_fields}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#ignore_absent_fields GenericEndpoint#ignore_absent_fields}
---
@@ -1312,7 +1312,7 @@ namespace: str
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#namespace GenericEndpoint#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#namespace GenericEndpoint#namespace}
---
@@ -1326,7 +1326,7 @@ write_fields: typing.List[str]
Top-level fields returned by write to persist in state.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#write_fields GenericEndpoint#write_fields}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#write_fields GenericEndpoint#write_fields}
---
diff --git a/docs/genericEndpoint.typescript.md b/docs/genericEndpoint.typescript.md
index 090fefa0..ccc0c376 100644
--- a/docs/genericEndpoint.typescript.md
+++ b/docs/genericEndpoint.typescript.md
@@ -4,7 +4,7 @@
### GenericEndpoint
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint vault_generic_endpoint}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint vault_generic_endpoint}.
#### Initializers
@@ -509,7 +509,7 @@ The construct id used in the generated config for the GenericEndpoint to import.
The id of the existing GenericEndpoint that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#import import section} in the documentation of this resource for the id to use
---
@@ -927,7 +927,7 @@ const genericEndpointConfig: genericEndpoint.GenericEndpointConfig = { ... }
| path
| string
| Full path where to the endpoint that will be written. |
| disableDelete
| boolean \| cdktf.IResolvable
| Don't attempt to delete the path from Vault if true. |
| disableRead
| boolean \| cdktf.IResolvable
| Don't attempt to read the path from Vault if true; drift won't be detected. |
-| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#id GenericEndpoint#id}. |
+| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#id GenericEndpoint#id}. |
| ignoreAbsentFields
| boolean \| cdktf.IResolvable
| When reading, disregard fields not present in data_json. |
| namespace
| string
| Target namespace. (requires Enterprise). |
| writeFields
| string[]
| Top-level fields returned by write to persist in state. |
@@ -1014,7 +1014,7 @@ public readonly dataJson: string;
JSON-encoded data to write.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#data_json GenericEndpoint#data_json}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#data_json GenericEndpoint#data_json}
---
@@ -1028,7 +1028,7 @@ public readonly path: string;
Full path where to the endpoint that will be written.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#path GenericEndpoint#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#path GenericEndpoint#path}
---
@@ -1042,7 +1042,7 @@ public readonly disableDelete: boolean | IResolvable;
Don't attempt to delete the path from Vault if true.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#disable_delete GenericEndpoint#disable_delete}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#disable_delete GenericEndpoint#disable_delete}
---
@@ -1056,7 +1056,7 @@ public readonly disableRead: boolean | IResolvable;
Don't attempt to read the path from Vault if true; drift won't be detected.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#disable_read GenericEndpoint#disable_read}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#disable_read GenericEndpoint#disable_read}
---
@@ -1068,7 +1068,7 @@ public readonly id: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#id GenericEndpoint#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#id GenericEndpoint#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1085,7 +1085,7 @@ public readonly ignoreAbsentFields: boolean | IResolvable;
When reading, disregard fields not present in data_json.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#ignore_absent_fields GenericEndpoint#ignore_absent_fields}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#ignore_absent_fields GenericEndpoint#ignore_absent_fields}
---
@@ -1099,7 +1099,7 @@ public readonly namespace: string;
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#namespace GenericEndpoint#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#namespace GenericEndpoint#namespace}
---
@@ -1113,7 +1113,7 @@ public readonly writeFields: string[];
Top-level fields returned by write to persist in state.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#write_fields GenericEndpoint#write_fields}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#write_fields GenericEndpoint#write_fields}
---
diff --git a/docs/genericSecret.csharp.md b/docs/genericSecret.csharp.md
index d1bc4ad0..65b6b173 100644
--- a/docs/genericSecret.csharp.md
+++ b/docs/genericSecret.csharp.md
@@ -4,7 +4,7 @@
### GenericSecret
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret vault_generic_secret}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret vault_generic_secret}.
#### Initializers
@@ -495,7 +495,7 @@ The construct id used in the generated config for the GenericSecret to import.
The id of the existing GenericSecret that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#import import section} in the documentation of this resource for the id to use
---
@@ -872,7 +872,7 @@ new GenericSecretConfig {
| Path
| string
| Full path where the generic secret will be written. |
| DeleteAllVersions
| object
| Only applicable for kv-v2 stores. If set, permanently deletes all versions for the specified key. |
| DisableRead
| object
| Don't attempt to read the token from Vault if true; drift won't be detected. |
-| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#id GenericSecret#id}. |
+| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#id GenericSecret#id}. |
| Namespace
| string
| Target namespace. (requires Enterprise). |
---
@@ -957,7 +957,7 @@ public string DataJson { get; set; }
JSON-encoded secret data to write.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#data_json GenericSecret#data_json}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#data_json GenericSecret#data_json}
---
@@ -971,7 +971,7 @@ public string Path { get; set; }
Full path where the generic secret will be written.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#path GenericSecret#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#path GenericSecret#path}
---
@@ -985,7 +985,7 @@ public object DeleteAllVersions { get; set; }
Only applicable for kv-v2 stores. If set, permanently deletes all versions for the specified key.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#delete_all_versions GenericSecret#delete_all_versions}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#delete_all_versions GenericSecret#delete_all_versions}
---
@@ -999,7 +999,7 @@ public object DisableRead { get; set; }
Don't attempt to read the token from Vault if true; drift won't be detected.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#disable_read GenericSecret#disable_read}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#disable_read GenericSecret#disable_read}
---
@@ -1011,7 +1011,7 @@ public string Id { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#id GenericSecret#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#id GenericSecret#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1028,7 +1028,7 @@ public string Namespace { get; set; }
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#namespace GenericSecret#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#namespace GenericSecret#namespace}
---
diff --git a/docs/genericSecret.go.md b/docs/genericSecret.go.md
index 371e3d85..df02ba0b 100644
--- a/docs/genericSecret.go.md
+++ b/docs/genericSecret.go.md
@@ -4,7 +4,7 @@
### GenericSecret
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret vault_generic_secret}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret vault_generic_secret}.
#### Initializers
@@ -495,7 +495,7 @@ The construct id used in the generated config for the GenericSecret to import.
The id of the existing GenericSecret that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#import import section} in the documentation of this resource for the id to use
---
@@ -872,7 +872,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/genericsecret"
| Path
| *string
| Full path where the generic secret will be written. |
| DeleteAllVersions
| interface{}
| Only applicable for kv-v2 stores. If set, permanently deletes all versions for the specified key. |
| DisableRead
| interface{}
| Don't attempt to read the token from Vault if true; drift won't be detected. |
-| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#id GenericSecret#id}. |
+| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#id GenericSecret#id}. |
| Namespace
| *string
| Target namespace. (requires Enterprise). |
---
@@ -957,7 +957,7 @@ DataJson *string
JSON-encoded secret data to write.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#data_json GenericSecret#data_json}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#data_json GenericSecret#data_json}
---
@@ -971,7 +971,7 @@ Path *string
Full path where the generic secret will be written.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#path GenericSecret#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#path GenericSecret#path}
---
@@ -985,7 +985,7 @@ DeleteAllVersions interface{}
Only applicable for kv-v2 stores. If set, permanently deletes all versions for the specified key.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#delete_all_versions GenericSecret#delete_all_versions}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#delete_all_versions GenericSecret#delete_all_versions}
---
@@ -999,7 +999,7 @@ DisableRead interface{}
Don't attempt to read the token from Vault if true; drift won't be detected.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#disable_read GenericSecret#disable_read}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#disable_read GenericSecret#disable_read}
---
@@ -1011,7 +1011,7 @@ Id *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#id GenericSecret#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#id GenericSecret#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1028,7 +1028,7 @@ Namespace *string
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#namespace GenericSecret#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#namespace GenericSecret#namespace}
---
diff --git a/docs/genericSecret.java.md b/docs/genericSecret.java.md
index f0410832..6106b0c8 100644
--- a/docs/genericSecret.java.md
+++ b/docs/genericSecret.java.md
@@ -4,7 +4,7 @@
### GenericSecret
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret vault_generic_secret}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret vault_generic_secret}.
#### Initializers
@@ -49,7 +49,7 @@ GenericSecret.Builder.create(Construct scope, java.lang.String id)
| path
| java.lang.String
| Full path where the generic secret will be written. |
| deleteAllVersions
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| Only applicable for kv-v2 stores. If set, permanently deletes all versions for the specified key. |
| disableRead
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| Don't attempt to read the token from Vault if true; drift won't be detected. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#id GenericSecret#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#id GenericSecret#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
---
@@ -120,7 +120,7 @@ Must be unique amongst siblings in the same scope
JSON-encoded secret data to write.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#data_json GenericSecret#data_json}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#data_json GenericSecret#data_json}
---
@@ -130,7 +130,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Full path where the generic secret will be written.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#path GenericSecret#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#path GenericSecret#path}
---
@@ -140,7 +140,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Only applicable for kv-v2 stores. If set, permanently deletes all versions for the specified key.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#delete_all_versions GenericSecret#delete_all_versions}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#delete_all_versions GenericSecret#delete_all_versions}
---
@@ -150,7 +150,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Don't attempt to read the token from Vault if true; drift won't be detected.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#disable_read GenericSecret#disable_read}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#disable_read GenericSecret#disable_read}
---
@@ -158,7 +158,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#id GenericSecret#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#id GenericSecret#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -171,7 +171,7 @@ If you experience problems setting this value it might not be settable. Please t
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#namespace GenericSecret#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#namespace GenericSecret#namespace}
---
@@ -626,7 +626,7 @@ The construct id used in the generated config for the GenericSecret to import.
The id of the existing GenericSecret that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#import import section} in the documentation of this resource for the id to use
---
@@ -1009,7 +1009,7 @@ GenericSecretConfig.builder()
| path
| java.lang.String
| Full path where the generic secret will be written. |
| deleteAllVersions
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| Only applicable for kv-v2 stores. If set, permanently deletes all versions for the specified key. |
| disableRead
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| Don't attempt to read the token from Vault if true; drift won't be detected. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#id GenericSecret#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#id GenericSecret#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
---
@@ -1094,7 +1094,7 @@ public java.lang.String getDataJson();
JSON-encoded secret data to write.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#data_json GenericSecret#data_json}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#data_json GenericSecret#data_json}
---
@@ -1108,7 +1108,7 @@ public java.lang.String getPath();
Full path where the generic secret will be written.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#path GenericSecret#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#path GenericSecret#path}
---
@@ -1122,7 +1122,7 @@ public java.lang.Object getDeleteAllVersions();
Only applicable for kv-v2 stores. If set, permanently deletes all versions for the specified key.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#delete_all_versions GenericSecret#delete_all_versions}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#delete_all_versions GenericSecret#delete_all_versions}
---
@@ -1136,7 +1136,7 @@ public java.lang.Object getDisableRead();
Don't attempt to read the token from Vault if true; drift won't be detected.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#disable_read GenericSecret#disable_read}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#disable_read GenericSecret#disable_read}
---
@@ -1148,7 +1148,7 @@ public java.lang.String getId();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#id GenericSecret#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#id GenericSecret#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1165,7 +1165,7 @@ public java.lang.String getNamespace();
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#namespace GenericSecret#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#namespace GenericSecret#namespace}
---
diff --git a/docs/genericSecret.python.md b/docs/genericSecret.python.md
index c0fdbe8c..6ee0b661 100644
--- a/docs/genericSecret.python.md
+++ b/docs/genericSecret.python.md
@@ -4,7 +4,7 @@
### GenericSecret
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret vault_generic_secret}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret vault_generic_secret}.
#### Initializers
@@ -45,7 +45,7 @@ genericSecret.GenericSecret(
| path
| str
| Full path where the generic secret will be written. |
| delete_all_versions
| typing.Union[bool, cdktf.IResolvable]
| Only applicable for kv-v2 stores. If set, permanently deletes all versions for the specified key. |
| disable_read
| typing.Union[bool, cdktf.IResolvable]
| Don't attempt to read the token from Vault if true; drift won't be detected. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#id GenericSecret#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#id GenericSecret#id}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
---
@@ -116,7 +116,7 @@ Must be unique amongst siblings in the same scope
JSON-encoded secret data to write.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#data_json GenericSecret#data_json}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#data_json GenericSecret#data_json}
---
@@ -126,7 +126,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Full path where the generic secret will be written.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#path GenericSecret#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#path GenericSecret#path}
---
@@ -136,7 +136,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Only applicable for kv-v2 stores. If set, permanently deletes all versions for the specified key.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#delete_all_versions GenericSecret#delete_all_versions}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#delete_all_versions GenericSecret#delete_all_versions}
---
@@ -146,7 +146,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Don't attempt to read the token from Vault if true; drift won't be detected.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#disable_read GenericSecret#disable_read}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#disable_read GenericSecret#disable_read}
---
@@ -154,7 +154,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#id GenericSecret#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#id GenericSecret#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -167,7 +167,7 @@ If you experience problems setting this value it might not be settable. Please t
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#namespace GenericSecret#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#namespace GenericSecret#namespace}
---
@@ -668,7 +668,7 @@ The construct id used in the generated config for the GenericSecret to import.
The id of the existing GenericSecret that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#import import section} in the documentation of this resource for the id to use
---
@@ -1045,7 +1045,7 @@ genericSecret.GenericSecretConfig(
| path
| str
| Full path where the generic secret will be written. |
| delete_all_versions
| typing.Union[bool, cdktf.IResolvable]
| Only applicable for kv-v2 stores. If set, permanently deletes all versions for the specified key. |
| disable_read
| typing.Union[bool, cdktf.IResolvable]
| Don't attempt to read the token from Vault if true; drift won't be detected. |
-| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#id GenericSecret#id}. |
+| id
| str
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#id GenericSecret#id}. |
| namespace
| str
| Target namespace. (requires Enterprise). |
---
@@ -1130,7 +1130,7 @@ data_json: str
JSON-encoded secret data to write.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#data_json GenericSecret#data_json}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#data_json GenericSecret#data_json}
---
@@ -1144,7 +1144,7 @@ path: str
Full path where the generic secret will be written.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#path GenericSecret#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#path GenericSecret#path}
---
@@ -1158,7 +1158,7 @@ delete_all_versions: typing.Union[bool, IResolvable]
Only applicable for kv-v2 stores. If set, permanently deletes all versions for the specified key.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#delete_all_versions GenericSecret#delete_all_versions}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#delete_all_versions GenericSecret#delete_all_versions}
---
@@ -1172,7 +1172,7 @@ disable_read: typing.Union[bool, IResolvable]
Don't attempt to read the token from Vault if true; drift won't be detected.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#disable_read GenericSecret#disable_read}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#disable_read GenericSecret#disable_read}
---
@@ -1184,7 +1184,7 @@ id: str
- *Type:* str
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#id GenericSecret#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#id GenericSecret#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1201,7 +1201,7 @@ namespace: str
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#namespace GenericSecret#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#namespace GenericSecret#namespace}
---
diff --git a/docs/genericSecret.typescript.md b/docs/genericSecret.typescript.md
index 52c3bf42..30bf5966 100644
--- a/docs/genericSecret.typescript.md
+++ b/docs/genericSecret.typescript.md
@@ -4,7 +4,7 @@
### GenericSecret
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret vault_generic_secret}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret vault_generic_secret}.
#### Initializers
@@ -495,7 +495,7 @@ The construct id used in the generated config for the GenericSecret to import.
The id of the existing GenericSecret that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#import import section} in the documentation of this resource for the id to use
---
@@ -858,7 +858,7 @@ const genericSecretConfig: genericSecret.GenericSecretConfig = { ... }
| path
| string
| Full path where the generic secret will be written. |
| deleteAllVersions
| boolean \| cdktf.IResolvable
| Only applicable for kv-v2 stores. If set, permanently deletes all versions for the specified key. |
| disableRead
| boolean \| cdktf.IResolvable
| Don't attempt to read the token from Vault if true; drift won't be detected. |
-| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#id GenericSecret#id}. |
+| id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#id GenericSecret#id}. |
| namespace
| string
| Target namespace. (requires Enterprise). |
---
@@ -943,7 +943,7 @@ public readonly dataJson: string;
JSON-encoded secret data to write.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#data_json GenericSecret#data_json}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#data_json GenericSecret#data_json}
---
@@ -957,7 +957,7 @@ public readonly path: string;
Full path where the generic secret will be written.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#path GenericSecret#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#path GenericSecret#path}
---
@@ -971,7 +971,7 @@ public readonly deleteAllVersions: boolean | IResolvable;
Only applicable for kv-v2 stores. If set, permanently deletes all versions for the specified key.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#delete_all_versions GenericSecret#delete_all_versions}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#delete_all_versions GenericSecret#delete_all_versions}
---
@@ -985,7 +985,7 @@ public readonly disableRead: boolean | IResolvable;
Don't attempt to read the token from Vault if true; drift won't be detected.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#disable_read GenericSecret#disable_read}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#disable_read GenericSecret#disable_read}
---
@@ -997,7 +997,7 @@ public readonly id: string;
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#id GenericSecret#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#id GenericSecret#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1014,7 +1014,7 @@ public readonly namespace: string;
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#namespace GenericSecret#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#namespace GenericSecret#namespace}
---
diff --git a/docs/githubAuthBackend.csharp.md b/docs/githubAuthBackend.csharp.md
index 257247d9..e15e3cfb 100644
--- a/docs/githubAuthBackend.csharp.md
+++ b/docs/githubAuthBackend.csharp.md
@@ -4,7 +4,7 @@
### GithubAuthBackend
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend vault_github_auth_backend}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend vault_github_auth_backend}.
#### Initializers
@@ -599,7 +599,7 @@ The construct id used in the generated config for the GithubAuthBackend to impor
The id of the existing GithubAuthBackend that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#import import section} in the documentation of this resource for the id to use
---
@@ -1252,7 +1252,7 @@ new GithubAuthBackendConfig {
| BaseUrl
| string
| The API endpoint to use. Useful if you are running GitHub Enterprise or an API-compatible authentication server. |
| Description
| string
| Specifies the description of the mount. This overrides the current stored value, if any. |
| DisableRemount
| object
| If set, opts out of mount migration on path updates. |
-| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#id GithubAuthBackend#id}. |
+| Id
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#id GithubAuthBackend#id}. |
| Namespace
| string
| Target namespace. (requires Enterprise). |
| OrganizationId
| double
| The ID of the organization users must be part of. |
| Path
| string
| Path where the auth backend is mounted. |
@@ -1265,7 +1265,7 @@ new GithubAuthBackendConfig {
| TokenPolicies
| string[]
| Generated Token's Policies. |
| TokenTtl
| double
| The initial ttl of the token to generate in seconds. |
| TokenType
| string
| The type of token to generate, service or batch. |
-| Tune
| object
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#tune GithubAuthBackend#tune}. |
+| Tune
| object
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#tune GithubAuthBackend#tune}. |
---
@@ -1349,7 +1349,7 @@ public string Organization { get; set; }
The organization users must be part of.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#organization GithubAuthBackend#organization}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#organization GithubAuthBackend#organization}
---
@@ -1363,7 +1363,7 @@ public string BaseUrl { get; set; }
The API endpoint to use. Useful if you are running GitHub Enterprise or an API-compatible authentication server.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#base_url GithubAuthBackend#base_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#base_url GithubAuthBackend#base_url}
---
@@ -1377,7 +1377,7 @@ public string Description { get; set; }
Specifies the description of the mount. This overrides the current stored value, if any.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#description GithubAuthBackend#description}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#description GithubAuthBackend#description}
---
@@ -1391,7 +1391,7 @@ public object DisableRemount { get; set; }
If set, opts out of mount migration on path updates.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#disable_remount GithubAuthBackend#disable_remount}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#disable_remount GithubAuthBackend#disable_remount}
---
@@ -1403,7 +1403,7 @@ public string Id { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#id GithubAuthBackend#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#id GithubAuthBackend#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1420,7 +1420,7 @@ public string Namespace { get; set; }
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#namespace GithubAuthBackend#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#namespace GithubAuthBackend#namespace}
---
@@ -1436,7 +1436,7 @@ The ID of the organization users must be part of.
Vault will attempt to fetch and set this value if it is not provided (vault-1.10+)
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#organization_id GithubAuthBackend#organization_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#organization_id GithubAuthBackend#organization_id}
---
@@ -1450,7 +1450,7 @@ public string Path { get; set; }
Path where the auth backend is mounted.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#path GithubAuthBackend#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#path GithubAuthBackend#path}
---
@@ -1464,7 +1464,7 @@ public string[] TokenBoundCidrs { get; set; }
Specifies the blocks of IP addresses which are allowed to use the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_bound_cidrs GithubAuthBackend#token_bound_cidrs}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_bound_cidrs GithubAuthBackend#token_bound_cidrs}
---
@@ -1478,7 +1478,7 @@ public double TokenExplicitMaxTtl { get; set; }
Generated Token's Explicit Maximum TTL in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_explicit_max_ttl GithubAuthBackend#token_explicit_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_explicit_max_ttl GithubAuthBackend#token_explicit_max_ttl}
---
@@ -1492,7 +1492,7 @@ public double TokenMaxTtl { get; set; }
The maximum lifetime of the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_max_ttl GithubAuthBackend#token_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_max_ttl GithubAuthBackend#token_max_ttl}
---
@@ -1506,7 +1506,7 @@ public object TokenNoDefaultPolicy { get; set; }
If true, the 'default' policy will not automatically be added to generated tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_no_default_policy GithubAuthBackend#token_no_default_policy}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_no_default_policy GithubAuthBackend#token_no_default_policy}
---
@@ -1520,7 +1520,7 @@ public double TokenNumUses { get; set; }
The maximum number of times a token may be used, a value of zero means unlimited.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_num_uses GithubAuthBackend#token_num_uses}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_num_uses GithubAuthBackend#token_num_uses}
---
@@ -1534,7 +1534,7 @@ public double TokenPeriod { get; set; }
Generated Token's Period.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_period GithubAuthBackend#token_period}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_period GithubAuthBackend#token_period}
---
@@ -1548,7 +1548,7 @@ public string[] TokenPolicies { get; set; }
Generated Token's Policies.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_policies GithubAuthBackend#token_policies}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_policies GithubAuthBackend#token_policies}
---
@@ -1562,7 +1562,7 @@ public double TokenTtl { get; set; }
The initial ttl of the token to generate in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_ttl GithubAuthBackend#token_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_ttl GithubAuthBackend#token_ttl}
---
@@ -1576,7 +1576,7 @@ public string TokenType { get; set; }
The type of token to generate, service or batch.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_type GithubAuthBackend#token_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_type GithubAuthBackend#token_type}
---
@@ -1588,7 +1588,7 @@ public object Tune { get; set; }
- *Type:* object
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#tune GithubAuthBackend#tune}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#tune GithubAuthBackend#tune}.
---
@@ -1615,14 +1615,14 @@ new GithubAuthBackendTune {
| **Name** | **Type** | **Description** |
| --- | --- | --- |
-| AllowedResponseHeaders
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#allowed_response_headers GithubAuthBackend#allowed_response_headers}. |
-| AuditNonHmacRequestKeys
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#audit_non_hmac_request_keys GithubAuthBackend#audit_non_hmac_request_keys}. |
-| AuditNonHmacResponseKeys
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#audit_non_hmac_response_keys GithubAuthBackend#audit_non_hmac_response_keys}. |
-| DefaultLeaseTtl
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#default_lease_ttl GithubAuthBackend#default_lease_ttl}. |
-| ListingVisibility
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#listing_visibility GithubAuthBackend#listing_visibility}. |
-| MaxLeaseTtl
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#max_lease_ttl GithubAuthBackend#max_lease_ttl}. |
-| PassthroughRequestHeaders
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#passthrough_request_headers GithubAuthBackend#passthrough_request_headers}. |
-| TokenType
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_type GithubAuthBackend#token_type}. |
+| AllowedResponseHeaders
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#allowed_response_headers GithubAuthBackend#allowed_response_headers}. |
+| AuditNonHmacRequestKeys
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#audit_non_hmac_request_keys GithubAuthBackend#audit_non_hmac_request_keys}. |
+| AuditNonHmacResponseKeys
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#audit_non_hmac_response_keys GithubAuthBackend#audit_non_hmac_response_keys}. |
+| DefaultLeaseTtl
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#default_lease_ttl GithubAuthBackend#default_lease_ttl}. |
+| ListingVisibility
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#listing_visibility GithubAuthBackend#listing_visibility}. |
+| MaxLeaseTtl
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#max_lease_ttl GithubAuthBackend#max_lease_ttl}. |
+| PassthroughRequestHeaders
| string[]
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#passthrough_request_headers GithubAuthBackend#passthrough_request_headers}. |
+| TokenType
| string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_type GithubAuthBackend#token_type}. |
---
@@ -1634,7 +1634,7 @@ public string[] AllowedResponseHeaders { get; set; }
- *Type:* string[]
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#allowed_response_headers GithubAuthBackend#allowed_response_headers}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#allowed_response_headers GithubAuthBackend#allowed_response_headers}.
---
@@ -1646,7 +1646,7 @@ public string[] AuditNonHmacRequestKeys { get; set; }
- *Type:* string[]
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#audit_non_hmac_request_keys GithubAuthBackend#audit_non_hmac_request_keys}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#audit_non_hmac_request_keys GithubAuthBackend#audit_non_hmac_request_keys}.
---
@@ -1658,7 +1658,7 @@ public string[] AuditNonHmacResponseKeys { get; set; }
- *Type:* string[]
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#audit_non_hmac_response_keys GithubAuthBackend#audit_non_hmac_response_keys}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#audit_non_hmac_response_keys GithubAuthBackend#audit_non_hmac_response_keys}.
---
@@ -1670,7 +1670,7 @@ public string DefaultLeaseTtl { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#default_lease_ttl GithubAuthBackend#default_lease_ttl}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#default_lease_ttl GithubAuthBackend#default_lease_ttl}.
---
@@ -1682,7 +1682,7 @@ public string ListingVisibility { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#listing_visibility GithubAuthBackend#listing_visibility}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#listing_visibility GithubAuthBackend#listing_visibility}.
---
@@ -1694,7 +1694,7 @@ public string MaxLeaseTtl { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#max_lease_ttl GithubAuthBackend#max_lease_ttl}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#max_lease_ttl GithubAuthBackend#max_lease_ttl}.
---
@@ -1706,7 +1706,7 @@ public string[] PassthroughRequestHeaders { get; set; }
- *Type:* string[]
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#passthrough_request_headers GithubAuthBackend#passthrough_request_headers}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#passthrough_request_headers GithubAuthBackend#passthrough_request_headers}.
---
@@ -1718,7 +1718,7 @@ public string TokenType { get; set; }
- *Type:* string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_type GithubAuthBackend#token_type}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_type GithubAuthBackend#token_type}.
---
diff --git a/docs/githubAuthBackend.go.md b/docs/githubAuthBackend.go.md
index a8180cc1..fd8725e1 100644
--- a/docs/githubAuthBackend.go.md
+++ b/docs/githubAuthBackend.go.md
@@ -4,7 +4,7 @@
### GithubAuthBackend
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend vault_github_auth_backend}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend vault_github_auth_backend}.
#### Initializers
@@ -599,7 +599,7 @@ The construct id used in the generated config for the GithubAuthBackend to impor
The id of the existing GithubAuthBackend that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#import import section} in the documentation of this resource for the id to use
---
@@ -1252,7 +1252,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/githubauthbackend"
| BaseUrl
| *string
| The API endpoint to use. Useful if you are running GitHub Enterprise or an API-compatible authentication server. |
| Description
| *string
| Specifies the description of the mount. This overrides the current stored value, if any. |
| DisableRemount
| interface{}
| If set, opts out of mount migration on path updates. |
-| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#id GithubAuthBackend#id}. |
+| Id
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#id GithubAuthBackend#id}. |
| Namespace
| *string
| Target namespace. (requires Enterprise). |
| OrganizationId
| *f64
| The ID of the organization users must be part of. |
| Path
| *string
| Path where the auth backend is mounted. |
@@ -1265,7 +1265,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/githubauthbackend"
| TokenPolicies
| *[]*string
| Generated Token's Policies. |
| TokenTtl
| *f64
| The initial ttl of the token to generate in seconds. |
| TokenType
| *string
| The type of token to generate, service or batch. |
-| Tune
| interface{}
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#tune GithubAuthBackend#tune}. |
+| Tune
| interface{}
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#tune GithubAuthBackend#tune}. |
---
@@ -1349,7 +1349,7 @@ Organization *string
The organization users must be part of.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#organization GithubAuthBackend#organization}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#organization GithubAuthBackend#organization}
---
@@ -1363,7 +1363,7 @@ BaseUrl *string
The API endpoint to use. Useful if you are running GitHub Enterprise or an API-compatible authentication server.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#base_url GithubAuthBackend#base_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#base_url GithubAuthBackend#base_url}
---
@@ -1377,7 +1377,7 @@ Description *string
Specifies the description of the mount. This overrides the current stored value, if any.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#description GithubAuthBackend#description}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#description GithubAuthBackend#description}
---
@@ -1391,7 +1391,7 @@ DisableRemount interface{}
If set, opts out of mount migration on path updates.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#disable_remount GithubAuthBackend#disable_remount}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#disable_remount GithubAuthBackend#disable_remount}
---
@@ -1403,7 +1403,7 @@ Id *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#id GithubAuthBackend#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#id GithubAuthBackend#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1420,7 +1420,7 @@ Namespace *string
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#namespace GithubAuthBackend#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#namespace GithubAuthBackend#namespace}
---
@@ -1436,7 +1436,7 @@ The ID of the organization users must be part of.
Vault will attempt to fetch and set this value if it is not provided (vault-1.10+)
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#organization_id GithubAuthBackend#organization_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#organization_id GithubAuthBackend#organization_id}
---
@@ -1450,7 +1450,7 @@ Path *string
Path where the auth backend is mounted.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#path GithubAuthBackend#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#path GithubAuthBackend#path}
---
@@ -1464,7 +1464,7 @@ TokenBoundCidrs *[]*string
Specifies the blocks of IP addresses which are allowed to use the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_bound_cidrs GithubAuthBackend#token_bound_cidrs}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_bound_cidrs GithubAuthBackend#token_bound_cidrs}
---
@@ -1478,7 +1478,7 @@ TokenExplicitMaxTtl *f64
Generated Token's Explicit Maximum TTL in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_explicit_max_ttl GithubAuthBackend#token_explicit_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_explicit_max_ttl GithubAuthBackend#token_explicit_max_ttl}
---
@@ -1492,7 +1492,7 @@ TokenMaxTtl *f64
The maximum lifetime of the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_max_ttl GithubAuthBackend#token_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_max_ttl GithubAuthBackend#token_max_ttl}
---
@@ -1506,7 +1506,7 @@ TokenNoDefaultPolicy interface{}
If true, the 'default' policy will not automatically be added to generated tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_no_default_policy GithubAuthBackend#token_no_default_policy}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_no_default_policy GithubAuthBackend#token_no_default_policy}
---
@@ -1520,7 +1520,7 @@ TokenNumUses *f64
The maximum number of times a token may be used, a value of zero means unlimited.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_num_uses GithubAuthBackend#token_num_uses}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_num_uses GithubAuthBackend#token_num_uses}
---
@@ -1534,7 +1534,7 @@ TokenPeriod *f64
Generated Token's Period.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_period GithubAuthBackend#token_period}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_period GithubAuthBackend#token_period}
---
@@ -1548,7 +1548,7 @@ TokenPolicies *[]*string
Generated Token's Policies.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_policies GithubAuthBackend#token_policies}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_policies GithubAuthBackend#token_policies}
---
@@ -1562,7 +1562,7 @@ TokenTtl *f64
The initial ttl of the token to generate in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_ttl GithubAuthBackend#token_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_ttl GithubAuthBackend#token_ttl}
---
@@ -1576,7 +1576,7 @@ TokenType *string
The type of token to generate, service or batch.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_type GithubAuthBackend#token_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_type GithubAuthBackend#token_type}
---
@@ -1588,7 +1588,7 @@ Tune interface{}
- *Type:* interface{}
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#tune GithubAuthBackend#tune}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#tune GithubAuthBackend#tune}.
---
@@ -1615,14 +1615,14 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/githubauthbackend"
| **Name** | **Type** | **Description** |
| --- | --- | --- |
-| AllowedResponseHeaders
| *[]*string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#allowed_response_headers GithubAuthBackend#allowed_response_headers}. |
-| AuditNonHmacRequestKeys
| *[]*string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#audit_non_hmac_request_keys GithubAuthBackend#audit_non_hmac_request_keys}. |
-| AuditNonHmacResponseKeys
| *[]*string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#audit_non_hmac_response_keys GithubAuthBackend#audit_non_hmac_response_keys}. |
-| DefaultLeaseTtl
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#default_lease_ttl GithubAuthBackend#default_lease_ttl}. |
-| ListingVisibility
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#listing_visibility GithubAuthBackend#listing_visibility}. |
-| MaxLeaseTtl
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#max_lease_ttl GithubAuthBackend#max_lease_ttl}. |
-| PassthroughRequestHeaders
| *[]*string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#passthrough_request_headers GithubAuthBackend#passthrough_request_headers}. |
-| TokenType
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_type GithubAuthBackend#token_type}. |
+| AllowedResponseHeaders
| *[]*string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#allowed_response_headers GithubAuthBackend#allowed_response_headers}. |
+| AuditNonHmacRequestKeys
| *[]*string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#audit_non_hmac_request_keys GithubAuthBackend#audit_non_hmac_request_keys}. |
+| AuditNonHmacResponseKeys
| *[]*string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#audit_non_hmac_response_keys GithubAuthBackend#audit_non_hmac_response_keys}. |
+| DefaultLeaseTtl
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#default_lease_ttl GithubAuthBackend#default_lease_ttl}. |
+| ListingVisibility
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#listing_visibility GithubAuthBackend#listing_visibility}. |
+| MaxLeaseTtl
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#max_lease_ttl GithubAuthBackend#max_lease_ttl}. |
+| PassthroughRequestHeaders
| *[]*string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#passthrough_request_headers GithubAuthBackend#passthrough_request_headers}. |
+| TokenType
| *string
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_type GithubAuthBackend#token_type}. |
---
@@ -1634,7 +1634,7 @@ AllowedResponseHeaders *[]*string
- *Type:* *[]*string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#allowed_response_headers GithubAuthBackend#allowed_response_headers}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#allowed_response_headers GithubAuthBackend#allowed_response_headers}.
---
@@ -1646,7 +1646,7 @@ AuditNonHmacRequestKeys *[]*string
- *Type:* *[]*string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#audit_non_hmac_request_keys GithubAuthBackend#audit_non_hmac_request_keys}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#audit_non_hmac_request_keys GithubAuthBackend#audit_non_hmac_request_keys}.
---
@@ -1658,7 +1658,7 @@ AuditNonHmacResponseKeys *[]*string
- *Type:* *[]*string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#audit_non_hmac_response_keys GithubAuthBackend#audit_non_hmac_response_keys}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#audit_non_hmac_response_keys GithubAuthBackend#audit_non_hmac_response_keys}.
---
@@ -1670,7 +1670,7 @@ DefaultLeaseTtl *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#default_lease_ttl GithubAuthBackend#default_lease_ttl}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#default_lease_ttl GithubAuthBackend#default_lease_ttl}.
---
@@ -1682,7 +1682,7 @@ ListingVisibility *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#listing_visibility GithubAuthBackend#listing_visibility}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#listing_visibility GithubAuthBackend#listing_visibility}.
---
@@ -1694,7 +1694,7 @@ MaxLeaseTtl *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#max_lease_ttl GithubAuthBackend#max_lease_ttl}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#max_lease_ttl GithubAuthBackend#max_lease_ttl}.
---
@@ -1706,7 +1706,7 @@ PassthroughRequestHeaders *[]*string
- *Type:* *[]*string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#passthrough_request_headers GithubAuthBackend#passthrough_request_headers}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#passthrough_request_headers GithubAuthBackend#passthrough_request_headers}.
---
@@ -1718,7 +1718,7 @@ TokenType *string
- *Type:* *string
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_type GithubAuthBackend#token_type}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_type GithubAuthBackend#token_type}.
---
diff --git a/docs/githubAuthBackend.java.md b/docs/githubAuthBackend.java.md
index a213a6a8..0aaeb4d9 100644
--- a/docs/githubAuthBackend.java.md
+++ b/docs/githubAuthBackend.java.md
@@ -4,7 +4,7 @@
### GithubAuthBackend
-Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend vault_github_auth_backend}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend vault_github_auth_backend}.
#### Initializers
@@ -62,7 +62,7 @@ GithubAuthBackend.Builder.create(Construct scope, java.lang.String id)
| baseUrl
| java.lang.String
| The API endpoint to use. Useful if you are running GitHub Enterprise or an API-compatible authentication server. |
| description
| java.lang.String
| Specifies the description of the mount. This overrides the current stored value, if any. |
| disableRemount
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| If set, opts out of mount migration on path updates. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#id GithubAuthBackend#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#id GithubAuthBackend#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
| organizationId
| java.lang.Number
| The ID of the organization users must be part of. |
| path
| java.lang.String
| Path where the auth backend is mounted. |
@@ -75,7 +75,7 @@ GithubAuthBackend.Builder.create(Construct scope, java.lang.String id)
| tokenPolicies
| java.util.List
| Generated Token's Policies. |
| tokenTtl
| java.lang.Number
| The initial ttl of the token to generate in seconds. |
| tokenType
| java.lang.String
| The type of token to generate, service or batch. |
-| tune
| com.hashicorp.cdktf.IResolvable OR java.util.List<GithubAuthBackendTune>
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#tune GithubAuthBackend#tune}. |
+| tune
| com.hashicorp.cdktf.IResolvable OR java.util.List<GithubAuthBackendTune>
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#tune GithubAuthBackend#tune}. |
---
@@ -145,7 +145,7 @@ Must be unique amongst siblings in the same scope
The organization users must be part of.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#organization GithubAuthBackend#organization}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#organization GithubAuthBackend#organization}
---
@@ -155,7 +155,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The API endpoint to use. Useful if you are running GitHub Enterprise or an API-compatible authentication server.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#base_url GithubAuthBackend#base_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#base_url GithubAuthBackend#base_url}
---
@@ -165,7 +165,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Specifies the description of the mount. This overrides the current stored value, if any.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#description GithubAuthBackend#description}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#description GithubAuthBackend#description}
---
@@ -175,7 +175,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
If set, opts out of mount migration on path updates.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#disable_remount GithubAuthBackend#disable_remount}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#disable_remount GithubAuthBackend#disable_remount}
---
@@ -183,7 +183,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#id GithubAuthBackend#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#id GithubAuthBackend#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -196,7 +196,7 @@ If you experience problems setting this value it might not be settable. Please t
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#namespace GithubAuthBackend#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#namespace GithubAuthBackend#namespace}
---
@@ -208,7 +208,7 @@ The ID of the organization users must be part of.
Vault will attempt to fetch and set this value if it is not provided (vault-1.10+)
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#organization_id GithubAuthBackend#organization_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#organization_id GithubAuthBackend#organization_id}
---
@@ -218,7 +218,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Path where the auth backend is mounted.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#path GithubAuthBackend#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#path GithubAuthBackend#path}
---
@@ -228,7 +228,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Specifies the blocks of IP addresses which are allowed to use the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_bound_cidrs GithubAuthBackend#token_bound_cidrs}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_bound_cidrs GithubAuthBackend#token_bound_cidrs}
---
@@ -238,7 +238,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Generated Token's Explicit Maximum TTL in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_explicit_max_ttl GithubAuthBackend#token_explicit_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_explicit_max_ttl GithubAuthBackend#token_explicit_max_ttl}
---
@@ -248,7 +248,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The maximum lifetime of the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_max_ttl GithubAuthBackend#token_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_max_ttl GithubAuthBackend#token_max_ttl}
---
@@ -258,7 +258,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
If true, the 'default' policy will not automatically be added to generated tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_no_default_policy GithubAuthBackend#token_no_default_policy}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_no_default_policy GithubAuthBackend#token_no_default_policy}
---
@@ -268,7 +268,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The maximum number of times a token may be used, a value of zero means unlimited.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_num_uses GithubAuthBackend#token_num_uses}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_num_uses GithubAuthBackend#token_num_uses}
---
@@ -278,7 +278,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Generated Token's Period.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_period GithubAuthBackend#token_period}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_period GithubAuthBackend#token_period}
---
@@ -288,7 +288,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Generated Token's Policies.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_policies GithubAuthBackend#token_policies}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_policies GithubAuthBackend#token_policies}
---
@@ -298,7 +298,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The initial ttl of the token to generate in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_ttl GithubAuthBackend#token_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_ttl GithubAuthBackend#token_ttl}
---
@@ -308,7 +308,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
The type of token to generate, service or batch.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_type GithubAuthBackend#token_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_type GithubAuthBackend#token_type}
---
@@ -316,7 +316,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
- *Type:* com.hashicorp.cdktf.IResolvable OR java.util.List<GithubAuthBackendTune>
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#tune GithubAuthBackend#tune}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#tune GithubAuthBackend#tune}.
---
@@ -875,7 +875,7 @@ The construct id used in the generated config for the GithubAuthBackend to impor
The id of the existing GithubAuthBackend that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#import import section} in the documentation of this resource for the id to use
---
@@ -1535,7 +1535,7 @@ GithubAuthBackendConfig.builder()
| baseUrl
| java.lang.String
| The API endpoint to use. Useful if you are running GitHub Enterprise or an API-compatible authentication server. |
| description
| java.lang.String
| Specifies the description of the mount. This overrides the current stored value, if any. |
| disableRemount
| java.lang.Boolean OR com.hashicorp.cdktf.IResolvable
| If set, opts out of mount migration on path updates. |
-| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#id GithubAuthBackend#id}. |
+| id
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#id GithubAuthBackend#id}. |
| namespace
| java.lang.String
| Target namespace. (requires Enterprise). |
| organizationId
| java.lang.Number
| The ID of the organization users must be part of. |
| path
| java.lang.String
| Path where the auth backend is mounted. |
@@ -1548,7 +1548,7 @@ GithubAuthBackendConfig.builder()
| tokenPolicies
| java.util.List
| Generated Token's Policies. |
| tokenTtl
| java.lang.Number
| The initial ttl of the token to generate in seconds. |
| tokenType
| java.lang.String
| The type of token to generate, service or batch. |
-| tune
| com.hashicorp.cdktf.IResolvable OR java.util.List<GithubAuthBackendTune>
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#tune GithubAuthBackend#tune}. |
+| tune
| com.hashicorp.cdktf.IResolvable OR java.util.List<GithubAuthBackendTune>
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#tune GithubAuthBackend#tune}. |
---
@@ -1632,7 +1632,7 @@ public java.lang.String getOrganization();
The organization users must be part of.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#organization GithubAuthBackend#organization}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#organization GithubAuthBackend#organization}
---
@@ -1646,7 +1646,7 @@ public java.lang.String getBaseUrl();
The API endpoint to use. Useful if you are running GitHub Enterprise or an API-compatible authentication server.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#base_url GithubAuthBackend#base_url}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#base_url GithubAuthBackend#base_url}
---
@@ -1660,7 +1660,7 @@ public java.lang.String getDescription();
Specifies the description of the mount. This overrides the current stored value, if any.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#description GithubAuthBackend#description}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#description GithubAuthBackend#description}
---
@@ -1674,7 +1674,7 @@ public java.lang.Object getDisableRemount();
If set, opts out of mount migration on path updates.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#disable_remount GithubAuthBackend#disable_remount}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#disable_remount GithubAuthBackend#disable_remount}
---
@@ -1686,7 +1686,7 @@ public java.lang.String getId();
- *Type:* java.lang.String
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#id GithubAuthBackend#id}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#id GithubAuthBackend#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -1703,7 +1703,7 @@ public java.lang.String getNamespace();
Target namespace. (requires Enterprise).
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#namespace GithubAuthBackend#namespace}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#namespace GithubAuthBackend#namespace}
---
@@ -1719,7 +1719,7 @@ The ID of the organization users must be part of.
Vault will attempt to fetch and set this value if it is not provided (vault-1.10+)
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#organization_id GithubAuthBackend#organization_id}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#organization_id GithubAuthBackend#organization_id}
---
@@ -1733,7 +1733,7 @@ public java.lang.String getPath();
Path where the auth backend is mounted.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#path GithubAuthBackend#path}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#path GithubAuthBackend#path}
---
@@ -1747,7 +1747,7 @@ public java.util.List getTokenBoundCidrs();
Specifies the blocks of IP addresses which are allowed to use the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_bound_cidrs GithubAuthBackend#token_bound_cidrs}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_bound_cidrs GithubAuthBackend#token_bound_cidrs}
---
@@ -1761,7 +1761,7 @@ public java.lang.Number getTokenExplicitMaxTtl();
Generated Token's Explicit Maximum TTL in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_explicit_max_ttl GithubAuthBackend#token_explicit_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_explicit_max_ttl GithubAuthBackend#token_explicit_max_ttl}
---
@@ -1775,7 +1775,7 @@ public java.lang.Number getTokenMaxTtl();
The maximum lifetime of the generated token.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_max_ttl GithubAuthBackend#token_max_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_max_ttl GithubAuthBackend#token_max_ttl}
---
@@ -1789,7 +1789,7 @@ public java.lang.Object getTokenNoDefaultPolicy();
If true, the 'default' policy will not automatically be added to generated tokens.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_no_default_policy GithubAuthBackend#token_no_default_policy}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_no_default_policy GithubAuthBackend#token_no_default_policy}
---
@@ -1803,7 +1803,7 @@ public java.lang.Number getTokenNumUses();
The maximum number of times a token may be used, a value of zero means unlimited.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_num_uses GithubAuthBackend#token_num_uses}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_num_uses GithubAuthBackend#token_num_uses}
---
@@ -1817,7 +1817,7 @@ public java.lang.Number getTokenPeriod();
Generated Token's Period.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_period GithubAuthBackend#token_period}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_period GithubAuthBackend#token_period}
---
@@ -1831,7 +1831,7 @@ public java.util.List getTokenPolicies();
Generated Token's Policies.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_policies GithubAuthBackend#token_policies}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_policies GithubAuthBackend#token_policies}
---
@@ -1845,7 +1845,7 @@ public java.lang.Number getTokenTtl();
The initial ttl of the token to generate in seconds.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_ttl GithubAuthBackend#token_ttl}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_ttl GithubAuthBackend#token_ttl}
---
@@ -1859,7 +1859,7 @@ public java.lang.String getTokenType();
The type of token to generate, service or batch.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_type GithubAuthBackend#token_type}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_type GithubAuthBackend#token_type}
---
@@ -1871,7 +1871,7 @@ public java.lang.Object getTune();
- *Type:* com.hashicorp.cdktf.IResolvable OR java.util.List<GithubAuthBackendTune>
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#tune GithubAuthBackend#tune}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#tune GithubAuthBackend#tune}.
---
@@ -1898,14 +1898,14 @@ GithubAuthBackendTune.builder()
| **Name** | **Type** | **Description** |
| --- | --- | --- |
-| allowedResponseHeaders
| java.util.List
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#allowed_response_headers GithubAuthBackend#allowed_response_headers}. |
-| auditNonHmacRequestKeys
| java.util.List
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#audit_non_hmac_request_keys GithubAuthBackend#audit_non_hmac_request_keys}. |
-| auditNonHmacResponseKeys
| java.util.List
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#audit_non_hmac_response_keys GithubAuthBackend#audit_non_hmac_response_keys}. |
-| defaultLeaseTtl
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#default_lease_ttl GithubAuthBackend#default_lease_ttl}. |
-| listingVisibility
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#listing_visibility GithubAuthBackend#listing_visibility}. |
-| maxLeaseTtl
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#max_lease_ttl GithubAuthBackend#max_lease_ttl}. |
-| passthroughRequestHeaders
| java.util.List
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#passthrough_request_headers GithubAuthBackend#passthrough_request_headers}. |
-| tokenType
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_type GithubAuthBackend#token_type}. |
+| allowedResponseHeaders
| java.util.List
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#allowed_response_headers GithubAuthBackend#allowed_response_headers}. |
+| auditNonHmacRequestKeys
| java.util.List
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#audit_non_hmac_request_keys GithubAuthBackend#audit_non_hmac_request_keys}. |
+| auditNonHmacResponseKeys
| java.util.List
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#audit_non_hmac_response_keys GithubAuthBackend#audit_non_hmac_response_keys}. |
+| defaultLeaseTtl
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#default_lease_ttl GithubAuthBackend#default_lease_ttl}. |
+| listingVisibility
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#listing_visibility GithubAuthBackend#listing_visibility}. |
+| maxLeaseTtl
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#max_lease_ttl GithubAuthBackend#max_lease_ttl}. |
+| passthroughRequestHeaders
| java.util.List
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#passthrough_request_headers GithubAuthBackend#passthrough_request_headers}. |
+| tokenType
| java.lang.String
| Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_type GithubAuthBackend#token_type}. |
---
@@ -1917,7 +1917,7 @@ public java.util.List getAllowedResponseHeaders();
- *Type:* java.util.List
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#allowed_response_headers GithubAuthBackend#allowed_response_headers}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#allowed_response_headers GithubAuthBackend#allowed_response_headers}.
---
@@ -1929,7 +1929,7 @@ public java.util.List getAuditNonHmacRequestKeys();
- *Type:* java.util.List
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#audit_non_hmac_request_keys GithubAuthBackend#audit_non_hmac_request_keys}.
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#audit_non_hmac_request_keys GithubAuthBackend#audit_non_hmac_request_keys}.
---
@@ -1941,7 +1941,7 @@ public java.util.List getAuditNonHmacResponseKeys();
- *Type:* java.util.List